[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.156907] audit: type=1800 audit(1541753109.211:25): pid=6081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.175977] audit: type=1800 audit(1541753109.211:26): pid=6081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.195413] audit: type=1800 audit(1541753109.241:27): pid=6081 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.19' (ECDSA) to the list of known hosts. 2018/11/09 08:45:23 fuzzer started 2018/11/09 08:45:28 dialing manager at 10.128.0.26:38493 2018/11/09 08:45:28 syscalls: 1 2018/11/09 08:45:28 code coverage: enabled 2018/11/09 08:45:28 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/11/09 08:45:28 setuid sandbox: enabled 2018/11/09 08:45:28 namespace sandbox: enabled 2018/11/09 08:45:28 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/09 08:45:28 fault injection: enabled 2018/11/09 08:45:28 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/09 08:45:28 net packed injection: enabled 2018/11/09 08:45:28 net device setup: enabled 08:47:49 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000001780)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000080)=0x2ca, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x1dd, 0x0) syzkaller login: [ 214.804729] IPVS: ftp: loaded support on port[0] = 21 [ 216.957044] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.964076] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.972628] device bridge_slave_0 entered promiscuous mode [ 217.100989] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.107588] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.116304] device bridge_slave_1 entered promiscuous mode [ 217.243337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 217.370939] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 217.757827] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 217.890279] bond0: Enslaving bond_slave_1 as an active interface with an up link 08:47:53 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000580)="6970365f76746930fd") [ 218.639354] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.647295] team0: Port device team_slave_0 added [ 218.857568] IPVS: ftp: loaded support on port[0] = 21 [ 218.939528] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.947594] team0: Port device team_slave_1 added [ 219.168010] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.176076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.184954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.348825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.502638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.510306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.519381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.708798] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.716657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.725641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.219194] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.225783] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.234272] device bridge_slave_0 entered promiscuous mode [ 222.287052] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.293619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.300540] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.307133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.315867] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.454794] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.461255] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.469880] device bridge_slave_1 entered promiscuous mode [ 222.654626] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.797091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.282146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.332680] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.507447] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.744431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.751491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 08:47:58 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) listen(r0, 0x93) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000140)=0x7, 0x4) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$nbd(r1, &(0x7f00000001c0), 0x10) r2 = accept(r0, &(0x7f00000002c0)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f00000000c0)=0x80) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB='E'], 0x1}}, 0x0) [ 224.025379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 224.032617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.631499] IPVS: ftp: loaded support on port[0] = 21 [ 224.870594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 224.878696] team0: Port device team_slave_0 added [ 225.196091] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.204198] team0: Port device team_slave_1 added [ 225.456327] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 225.463581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.472431] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.648888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 225.656153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.665131] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.866158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 225.873874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.882808] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.078220] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.086012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.095158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.112609] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.119077] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.127642] device bridge_slave_0 entered promiscuous mode [ 229.299102] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.305650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.312663] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.319121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.327629] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.374304] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.380770] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.389371] device bridge_slave_1 entered promiscuous mode [ 229.688241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.936792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 230.002549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.715967] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.990756] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 231.121264] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 231.128497] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 231.400568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 231.407763] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:48:06 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) [ 232.293914] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 232.302007] team0: Port device team_slave_0 added [ 232.617537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 232.625805] team0: Port device team_slave_1 added [ 232.722870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.896710] IPVS: ftp: loaded support on port[0] = 21 [ 232.988630] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 232.995860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 233.004783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 233.346570] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 233.353832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 233.362594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 233.687965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 233.695645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.704610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.883507] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 233.996173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 234.004535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.013347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.064988] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.071377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.079678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.246492] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.835931] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.842490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.849360] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.855992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.864982] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 238.303295] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.309768] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.318359] device bridge_slave_0 entered promiscuous mode [ 238.626181] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.632871] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.641316] device bridge_slave_1 entered promiscuous mode [ 238.808949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.995038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.323792] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.256443] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.602369] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.938842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.946110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.261337] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 241.268997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:48:17 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002780)=ANY=[]}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000580)='ip6_vti0\x00') [ 242.113283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.121215] team0: Port device team_slave_0 added [ 242.437238] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.626318] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 242.634484] team0: Port device team_slave_1 added [ 242.990492] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 242.997840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.006658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.366059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.373443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.382168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.416048] IPVS: ftp: loaded support on port[0] = 21 [ 243.745486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.753224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.762363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.899723] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.152813] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.160454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.169724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 08:48:19 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 08:48:20 executing program 0: unshare(0x400) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000005c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) bind(r0, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23}, 0x4, 0x0, 0x1, 0x1}}, 0x80) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=""/163, &(0x7f0000000600)=0xa3) sendto$inet(r0, &(0x7f0000000000)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000540), 0x1) [ 245.325209] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 245.331633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 245.339706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 08:48:20 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000100)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000140)=r2) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000080)=r3) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'sit0\x00\x00\x00\t\x00', @ifru_ivalue=0x706000}) 08:48:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@deltclass={0x24, 0x29, 0xb2675b17f04ae297, 0x0, 0x0, {0x0, r1, {}, {0x0, 0x7}}}, 0x24}}, 0x0) 08:48:21 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0184908, &(0x7f0000000280)={0x0, 0x0, 0x3}) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0x28800) socketpair(0x1, 0x5, 0x5, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f00000000c0)={0x0, r2}) [ 246.446831] ion_ioctl: ioctl validate failed 08:48:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000240)=ANY=[@ANYBLOB="dff86469974bb01a76be8b0f171b2d0ca9c5945ff87dcdf3f13013bf0f9cee7b26a884f67ec526f6f514087ebc8a1876cd7c9e7e43b4d69e2b55c8fb5d8bb34346b50f37f27ef84a7ad71e873985ab768ec0aa4ee971cb81610b6ab2edefde0e64cf100000"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000200)=0x30) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) mremap(&(0x7f0000016000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000001000/0x3000)=nil) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)) [ 246.782863] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 246.851618] 8021q: adding VLAN 0 to HW filter on device team0 08:48:22 executing program 0: ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000240)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="230000005e00817491bc655067d7aee4050c00000f00000018a30000000000008b1832", 0x23}], 0x1, &(0x7f0000000a00)}, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 08:48:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={"6c6f000acc0000000000000000002600", {0x2, 0x0, @rand_addr}}) r2 = shmget(0x2, 0x13000, 0x20, &(0x7f0000fea000/0x13000)=nil) shmctl$IPC_RMID(r2, 0x0) [ 248.917862] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.924445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.931339] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.937949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.946369] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 249.402481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.973375] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.979927] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.988543] device bridge_slave_0 entered promiscuous mode [ 250.326164] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.332809] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.341194] device bridge_slave_1 entered promiscuous mode [ 250.684717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.969713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.872391] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.214866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.576446] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.583721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.777632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.925714] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.932973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.802100] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.810087] team0: Port device team_slave_0 added [ 254.022407] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.030401] team0: Port device team_slave_1 added [ 254.062752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.343407] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.350502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.359521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.556286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.563664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.572681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 08:48:29 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x8, 0x209e22, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 254.883325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.890954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.899959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.087472] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.094206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.102202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.158474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 255.166279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.175192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.885162] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.446018] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.452558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.459442] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.466031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.474243] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 257.481206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.319140] 8021q: adding VLAN 0 to HW filter on device bond0 [ 260.101613] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 260.817298] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 260.823906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.831372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 261.379121] 8021q: adding VLAN 0 to HW filter on device team0 [ 261.392008] ip (7410) used greatest stack depth: 53072 bytes left 08:48:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000780)="696f005bfc57169babee54ed16e39e7a8fe4b90016f266e3f63c443b3fc5040006bb5cd4bd7c7373b3d4d470a0cb5617aadbfb64c5e4983c25d024a9f3c489cc438f9e6de16364672bf70ad3bc27c924384f5586d4a51c6420a4e356e4e5ff7e284ee69a86f67264667d24b6f6502eb380104d262f889f390101ccaff805816603f65ba309000000000000004a80004e16b70c9649a2f9f6900fc77267a03436ba91a7f50c747f58236e5fa35ce74bb8da57ae4acad3aec3660ea6671da9f55e8211dfc5a17b8d3b1865e97da694c88f4920f772f196bdf299fc0b233d60654271ce981015") pread64(r0, &(0x7f0000000000), 0xffffff83, 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x0, 0x0) [ 264.020705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.488318] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 08:48:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000000)) [ 264.939751] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 264.946125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.954136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.236975] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.018149] ip6_vti0: mtu greater than device maximum [ 267.025647] ip6_vti0: mtu greater than device maximum 08:48:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f00000008c0)=ANY=[@ANYBLOB="fb"]) 08:48:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={"6c6f000acc0000000000000000002600", {0x2, 0x0, @rand_addr}}) r2 = shmget(0x2, 0x13000, 0x20, &(0x7f0000fea000/0x13000)=nil) shmctl$IPC_RMID(r2, 0x0) 08:48:42 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r0, &(0x7f0000000040)={0x48, 0x0, 0x4, [{0x0, 0x6, 0x4, 0x4, 'ppp0'}, {0x4, 0x0, 0x0, 0xfffffffffffffe00}]}, 0x48) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) write$FUSE_WRITE(r1, &(0x7f0000000100)={0x18, 0x0, 0x8, {0x8}}, 0x18) connect(r1, &(0x7f0000000140)=@generic={0x4, "0532db0ea7fe8d148827c9e56ed38e3ddaa7ebf0b5b392cbdd7a13ccea54bed3de1732fd780e7cdce66aadb0c2eb56989b194dabcc7db4d4f943a677b23c671e713e0b760043f6a60e20261473b7392a63d7da78af3910cf316753cf02c07aac31665b858dabe33778cdf6bafea9cdb35659659ee07024a1cf8bbb9142b9"}, 0x80) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000001c0)={'yam0\x00', 0x1104e96b}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000200)=[@in={0x2, 0x4e21, @multicast1}], 0x10) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) sched_getparam(r2, &(0x7f0000000280)) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000002c0)={0x10201, 0x0, &(0x7f0000fff000/0x1000)=nil}) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000300)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x108000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) ioctl$TCSBRKP(r1, 0x5425, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000480)='security.capability\x00', &(0x7f00000004c0)=@v1={0x1000000, [{0x9, 0xf8}]}, 0xc, 0x1) getsockopt(r0, 0x0, 0xfffffffffffffffd, &(0x7f0000000500)=""/29, &(0x7f0000000540)=0x1d) ioctl$TIOCEXCL(r1, 0x540c) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000580)={{0x2, 0x4e23, @multicast2}, {0x306, @random="7ddbbf19740e"}, 0x40, {0x2, 0x4e21, @broadcast}, 'ip6_vti0\x00'}) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000600)=0x299, 0x4) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000640), 0x10) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000680)={0x200, 0x0, 0x8, 0x8001, 0x8001, 0xd5, 0x10001, 0xa19acb9, 0x18, 0xfffffffffffffffd, 0xffff, 0xfffffffffffffffe}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000006c0)={0x7, 0x0, 0x8}) r4 = open(&(0x7f0000000700)='./file0\x00', 0x0, 0x40) read(r0, &(0x7f0000000740)=""/241, 0xf1) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000840)={0x0, 0x0, 0x3, 0x0, [], [{0x7, 0x1, 0x8000, 0x100000000, 0x5e55, 0x6}, {0x0, 0x100000001, 0x1f, 0x9, 0xffffffffffffff01, 0x2}], [[], [], []]}) fcntl$lock(r1, 0x26, &(0x7f00000009c0)={0x3, 0x0, 0x738, 0x5, r2}) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x2) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000a40)={0x1, &(0x7f0000000a00)=[{0x3, 0x1, 0xffffffff, 0x5a5a}]}, 0x10) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000a80)={'bcsf0\x00', 0x3}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000ac0)=0xa1c) 08:48:42 executing program 2: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 08:48:42 executing program 1: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) 08:48:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x4000000000089f4, &(0x7f0000000000)={'sit0\x00', @ifru_addrs=@in={0x2, 0x0, @rand_addr}}) 08:48:42 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f0000000380)={[{0x13, 0x10001, 0x3, 0x2d, 0x3, 0x80000000, 0xebe5, 0x0, 0x5, 0x3, 0x1, 0x1, 0x1}, {0x7, 0x6, 0x5, 0x9987, 0xc196, 0x3, 0x400000, 0x0, 0x40, 0x2, 0x2, 0x1}, {0x4, 0x167, 0x5936, 0xc29, 0xff, 0x0, 0x1, 0x9, 0x0, 0x763ea325, 0x339, 0x0, 0x8000}], 0x101}) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xe4446895}, 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="0444a0ff4e67ac4e6261010000000c00030000000000000000000c00020014000000000000000c0004000300000000000000300601d1ddda8fc4232fcc71110b6428e9418e12232d5e2c32c4d2b90ff4960ee530e494bb45f2540bc2b7a1096e9fc435afb3be659540fbe8"], 0x1}, 0x1, 0x0, 0x0, 0x20040005}, 0x800) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000002c0)=0x1, 0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0x241}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000580)={0x0, 0x0, @pic={0x0, 0x2947ea45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) 08:48:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={"6c6f000acc0000000000000000002600", {0x2, 0x0, @rand_addr}}) r2 = shmget(0x2, 0x13000, 0x20, &(0x7f0000fea000/0x13000)=nil) shmctl$IPC_RMID(r2, 0x0) 08:48:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)) 08:48:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 08:48:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x40000000, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:48:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xffffffc0}}) 08:48:43 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000002c0)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x65, &(0x7f0000000100)=""/101}, &(0x7f0000000180)="df5516b652cd", &(0x7f0000000240)=""/2, 0x0, 0x0, 0x0, &(0x7f0000000280)}) 08:48:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x10, &(0x7f0000000040), 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000540)={0xd0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0)=""/252, &(0x7f0000000000)=0xfc) [ 268.586565] IPVS: ftp: loaded support on port[0] = 21 [ 269.900420] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.906944] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.915050] device bridge_slave_0 entered promiscuous mode [ 269.991102] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.997573] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.005719] device bridge_slave_1 entered promiscuous mode [ 270.080291] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.154378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 270.381023] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 270.459543] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 270.606470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.613580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.839842] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 270.847521] team0: Port device team_slave_0 added [ 270.921998] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 270.929553] team0: Port device team_slave_1 added [ 271.005340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.083666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.160143] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 271.167651] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.176568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.250045] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 271.257569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.266634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.104041] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.110456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.117400] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.123861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.131472] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 272.552306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.191030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.477871] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.759231] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.765701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.773740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.055042] 8021q: adding VLAN 0 to HW filter on device team0 08:48:52 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 08:48:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_group_source_req(r1, 0x0, 0x0, 0xfffffffffffffffe, 0x510) 08:48:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 08:48:52 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x0, 0x1f}}, 0x43) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 08:48:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000002240)={0x14, r1, 0xb21, 0x0, 0x0, {0x3, 0x0, 0xfffffffffffff000}}, 0x14}}, 0x0) 08:48:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="6d656d00017937737761532e63757289c942abe3fa72656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) 08:48:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x2, {0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x43) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) unlinkat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 08:48:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 08:48:53 executing program 2: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x0, 0x1f}}, 0x43) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 08:48:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x40000000000013, 0x1000000000010, 0xe68}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xf, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x700}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000001200)='syzkaller\x00', 0x8, 0x88, &(0x7f0000001240)=""/136}, 0x48) 08:48:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) listen(r0, 0x93) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0), 0x8) [ 278.606960] kauditd_printk_skb: 3 callbacks suppressed [ 278.606997] audit: type=1804 audit(1541753333.661:31): pid=7929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/newroot/13/file0/file0" dev="ramfs" ino=21289 res=1 [ 278.746789] audit: type=1804 audit(1541753333.701:32): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/newroot/13/file0/file0" dev="ramfs" ino=21289 res=1 08:48:53 executing program 0: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f00000006c0), 0xfffffea1) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000080)) tkill(r1, 0x15) 08:48:54 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x20000010000, 0x0) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) write$FUSE_STATFS(r2, &(0x7f0000000140)={0x60, 0x0, 0x2, {{0x847, 0xfff, 0x6, 0x3, 0xa85, 0x2, 0x4, 0x1}}}, 0x60) 08:48:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000100)=@proc, 0xc, &(0x7f0000000440), 0x0, &(0x7f0000000d00)}, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=0xc) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 08:48:54 executing program 5: 08:48:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x40000000000013, 0x1000000000010, 0xe68}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0xf, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x700}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000001200)='syzkaller\x00', 0x8, 0x88, &(0x7f0000001240)=""/136}, 0x48) [ 279.311945] hrtimer: interrupt took 248413 ns 08:48:54 executing program 1: 08:48:54 executing program 2: 08:48:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'ip6tnl0\x00', @ifru_ivalue}) 08:48:54 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000005700)={&(0x7f0000000040), 0xc, &(0x7f00000056c0)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x4, 'C\x00\x00\x001\x00'}]}, 0x19b}}, 0x0) 08:48:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000580)="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", 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc7bb9650b5de56946c568f95d22467190ba3b6d59a5958d6fa9259c8a2ac4677b00000000000000000000200000f8bf54da32", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000007a80)=""/60, 0x3c) [ 279.697280] netlink: 'syz-executor4': attribute type 4 has an invalid length. 08:48:54 executing program 5: 08:48:54 executing program 2: 08:48:55 executing program 0: 08:48:55 executing program 3: 08:48:55 executing program 5: 08:48:55 executing program 1: 08:48:55 executing program 4: 08:48:55 executing program 2: 08:48:55 executing program 1: 08:48:55 executing program 0: 08:48:55 executing program 3: 08:48:55 executing program 4: 08:48:55 executing program 5: 08:48:55 executing program 2: 08:48:55 executing program 1: 08:48:55 executing program 4: 08:48:56 executing program 0: 08:48:56 executing program 3: 08:48:56 executing program 5: 08:48:56 executing program 2: 08:48:56 executing program 1: 08:48:56 executing program 0: 08:48:56 executing program 3: 08:48:56 executing program 4: 08:48:56 executing program 2: 08:48:56 executing program 5: 08:48:56 executing program 1: 08:48:56 executing program 0: 08:48:56 executing program 3: 08:48:56 executing program 4: 08:48:56 executing program 5: 08:48:57 executing program 2: 08:48:57 executing program 1: 08:48:57 executing program 0: 08:48:57 executing program 3: 08:48:57 executing program 4: 08:48:57 executing program 5: 08:48:57 executing program 1: 08:48:57 executing program 2: 08:48:57 executing program 1: 08:48:57 executing program 0: 08:48:57 executing program 3: 08:48:57 executing program 5: 08:48:57 executing program 4: 08:48:57 executing program 1: 08:48:58 executing program 2: 08:48:58 executing program 4: 08:48:58 executing program 0: 08:48:58 executing program 3: 08:48:58 executing program 5: 08:48:58 executing program 1: 08:48:58 executing program 2: 08:48:58 executing program 4: 08:48:58 executing program 1: 08:48:58 executing program 0: 08:48:58 executing program 3: 08:48:58 executing program 5: 08:48:58 executing program 1: 08:48:59 executing program 2: 08:48:59 executing program 4: 08:48:59 executing program 3: 08:48:59 executing program 0: 08:48:59 executing program 2: 08:48:59 executing program 1: 08:48:59 executing program 5: 08:48:59 executing program 3: 08:48:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 08:48:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000200)={{0x2, 0x0, @remote}, {0x0, @dev}, 0x0, {0x2, 0x0, @loopback}, 'veth1_to_bridge\x00'}) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500add427323b470c458c5602067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000000080000efffe1b0000000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 08:48:59 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendfile(r1, r0, 0x0, 0x0) 08:48:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) listen(r0, 0x0) listen(r0, 0x80) 08:48:59 executing program 2: syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') 08:48:59 executing program 3: mkdir(&(0x7f0000578000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x41) flock(r0, 0xc) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=@known='system.posix_acl_default\x00', &(0x7f00000003c0)="0200000004000000000000000200f30000000000", 0x14, 0x0) 08:49:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) listen(r0, 0x81) sendmsg$inet_sctp(r0, &(0x7f0000001900)={&(0x7f0000000040), 0x10, &(0x7f0000000680), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2000000000000000bc8563a66299aa5d8400000008f2fffffd9640000000000000000000000000bb"], 0x20}, 0x0) 08:49:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000000)=0x100, 0xfffffffffffffdaa) 08:49:00 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000000000000000000"], 0x58) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x22, 0xfffffffffffffffe, 0x36) 08:49:00 executing program 1: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f0000000140)="50f073656c696e75786367726f757000") close(r0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000000)={0x29, 0x0, 0x3, 0x1f, 0x4, 0x0, 0x5, 0xa3}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000004f000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="26410f300f01c90f06643e400f01c9420f758e000000002ef3400fb8e566baf80cb8ac8abd80ef66bafc0cedd2fe0f01ca66ba4000ec", 0x36}], 0x1, 0x0, &(0x7f0000000180), 0x0) getpgid(0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01dfdde80f32d9e90f086665676426f7c5000000000f2245deef0f23f5", 0x23}], 0x1, 0x0, &(0x7f0000000140), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f00000001c0)="0f0f280dbaf80c66b8561eac8666efbafc0cecd8d80f01720cbad10466ed26900f019d848066b92902000066b80800000066ba000000000f300f01d10f013b", 0x3f}], 0x1, 0x0, &(0x7f0000000300), 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 08:49:00 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$xdp(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x48011}, 0x20000040) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) writev(r0, &(0x7f0000000140), 0x100000000000007a) getsockopt$inet6_tcp_int(r1, 0x6, 0x5, &(0x7f0000000080), &(0x7f0000000140)=0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x100) 08:49:00 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001680)='net/ip6_tables_matches\x00') ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = semget$private(0x0, 0x20000000104, 0x0) semop(r1, &(0x7f0000000040)=[{0x7, 0x5, 0x1000}, {0x7}], 0x2) r2 = getpid() process_vm_writev(r2, &(0x7f0000000300)=[{&(0x7f0000000080)=""/196, 0xc4}, {&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000200)=""/251, 0xfb}], 0x4, &(0x7f0000001580)=[{&(0x7f0000000340)=""/197, 0xc5}, {&(0x7f0000000440)=""/79, 0x4f}, {&(0x7f00000004c0)=""/63, 0x3f}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/65, 0x41}], 0x5, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001600)='/dev/rtc0\x00', 0xc0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000001640)={0xac9, 0x2, 0x0, 0x1}) semop(r1, &(0x7f0000035000)=[{0x4, 0x81}], 0x17a) 08:49:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000040)={0x0, @sliced={0x800, [0x5, 0x8, 0x2, 0x0, 0x3f, 0x1ff, 0x0, 0x1b, 0x4, 0xffffffff, 0x5, 0x9, 0x1ff, 0x100, 0x8001, 0x80000000, 0xed, 0x4, 0xb9, 0x0, 0x1ff, 0x2494, 0x3, 0x7ff, 0x3, 0x1f, 0x3f, 0x9, 0x3, 0x800, 0x9, 0x1, 0x5, 0xfffffffffffffffe, 0x8, 0x88ba, 0x4, 0x9, 0xce, 0xc045, 0x4ef, 0x8001, 0x40, 0xffffffff, 0x3ff, 0x1, 0x8000, 0x3], 0x4}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x9, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xac) 08:49:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) socket$netlink(0x10, 0x3, 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x8, 0x40000) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000180)={0x0, 0x800, 0x5, 0x3, 0x6, 0x1390f39f, 0x5, 0x101, 0x6, 0x7}) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f00000001c0)=0x8) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r1, @ANYBLOB="000000585d759044bb3b4b032a9ab8e2000a000200aaaaaaaaaaaa0000"], 0xffd3}}, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) 08:49:00 executing program 2: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb34f68c6487f", 0xb2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000380)="002cba69819bacf2b6247429895c41e152ff4b5b5ada31341c9471f888af4b734c5dbf4124fc2830c3ee74c72998bde0f2efc784f371a383e2e5b3821e67e7090bf1281d1f4ee116c670a5e1a76d0156c593e3893caf4a9fa60aa581394ed54467b932d7dee7a974990de543ef954d8327", 0x71, 0xfffffffffffffff9) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000200)="0f01cf660f5529660f3804180f080f0d7e0736260f5cd8f36f0f01cb2e3e660fd4d80f35", 0x24}], 0x1, 0x0, &(0x7f0000000040), 0x190) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f00000005c0)={r3, 0x5, 0xc5f, r4}) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x109000, 0x0) write$P9_ROPEN(r5, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x0, 0x6}, 0x100}}, 0x18) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x101000, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000580)=0x2fff) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2$9p(&(0x7f00000001c0), 0x0) [ 285.724566] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. [ 285.740085] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x810, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0x15}], 0x1, &(0x7f0000000140)}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="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", 0x2b7}], 0x1, &(0x7f0000000e00)}, 0x8000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000a80)="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", 0x2d5}], 0x0, &(0x7f0000003b40)}, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:getty_exec_t:s0\x00', 0x22, 0x1) 08:49:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_tables_targets\x00') ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000300)={"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"}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x20000) memfd_create(&(0x7f0000000180)='\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 08:49:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x3, 0x1, 0xfffffffffffffff9, 0x8, r2}, 0x10) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x2, 0x11, r3, 0x0) r4 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x20, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000380)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x3, @mcast2, 0x8}, {0xa, 0x4e22, 0x8001, @local, 0x1}, r5, 0x3454}}, 0x48) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000006dc0), 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000000a000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f0000000080)="f30f5ac36667660fecf066b95803000066b82c02000066ba000000000f300f01dfe1fb66b8ed0f300e0f23c80f21f86635040080000f23f80f300f01cb66b9030300000f32da80f60e", 0x49}], 0x1, 0x0, &(0x7f0000000100), 0x0) r6 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3ff, 0x200080) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r6, 0x5386, &(0x7f0000000100)) 08:49:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x50, &(0x7f0000000500)={"54000000ffffff070000000000000000005ea040b500"}, &(0x7f0000000100)=0x1e) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) [ 286.169980] dccp_invalid_packet: invalid packet type [ 286.215130] dccp_invalid_packet: invalid packet type 08:49:01 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x65, 0x0, &(0x7f0000000280)=""/244, &(0x7f0000000040)=0xffffffffffffff0a) 08:49:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_tables_targets\x00') ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000300)={"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"}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x20000) memfd_create(&(0x7f0000000180)='\x00', 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x8) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2b, 0x0, @local, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 08:49:01 executing program 0: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f00000f0000/0x3000)=nil) 08:49:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x3) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f0000000180)=0x1, 0x4) r1 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x2000)=nil, 0x4000) shmdt(r1) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 08:49:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001680)='net/ip6_tables_matches\x00') ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = semget$private(0x0, 0x20000000104, 0x0) semop(r1, &(0x7f0000000040)=[{0x7, 0x5, 0x1000}, {0x7}], 0x2) r2 = getpid() process_vm_writev(r2, &(0x7f0000000300)=[{&(0x7f0000000080)=""/196, 0xc4}, {&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000200)=""/251, 0xfb}], 0x4, &(0x7f0000001580)=[{&(0x7f0000000340)=""/197, 0xc5}, {&(0x7f0000000440)=""/79, 0x4f}, {&(0x7f00000004c0)=""/63, 0x3f}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/65, 0x41}], 0x5, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001600)='/dev/rtc0\x00', 0xc0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000001640)={0xac9, 0x2, 0x0, 0x1}) semop(r1, &(0x7f0000035000)=[{0x4, 0x81}], 0x17a) 08:49:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800e, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028]}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x389756b1353683f6, 0x120, 0x0, 0xffffffffffffffeb) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000100)="382e0fea65ccce1cced4c3558ac5c4db11778d6c129b0940762be74dc0200e0b6f9c8278a44b48b9e7", 0x29) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001380)='/dev/audio\x00', 0x341100, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000013c0)={0x0, 0x8001, 0x400, 0x7ccf}, &(0x7f0000001400)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000001440)=@sack_info={r2, 0x8, 0x1}, &(0x7f0000001480)=0xc) [ 286.664551] dccp_invalid_packet: invalid packet type 08:49:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x100) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000080)={0x0, 0x4}, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1a) 08:49:01 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21, @multicast1}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x5e21}, 0x1c) pipe(&(0x7f0000000000)) syz_emit_ethernet(0x32, &(0x7f000018f000)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}}}}}}, 0x0) 08:49:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 286.909750] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:49:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x80803, 0x87) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x2, @in6=@loopback, 0x0, 0x2, 0x0, 0x90}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, &(0x7f0000000000)="a8c810e1afa86fac191368b591e219ede809f576479a70d611c5d829358b856fe7bfb1f6c4a719fb45fe19b3d32000373634aa", 0x33, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0xe4, @mcast2, 0x400}, 0x1c) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, r3) 08:49:02 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x80000001, 0xc8001) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000000c0)={0x3, 0x0, 0x8, 'queue1\x00', 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x101) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000180)={&(0x7f0000ff9000/0x4000)=nil, 0x6, 0x5, 0x90, &(0x7f0000ffa000/0x1000)=nil, 0x8001}) 08:49:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x5, 0x10e, 0x3ff, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000180)}, 0x10) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r3 = accept$alg(r1, 0x0, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) write(r3, &(0x7f0000000540), 0x0) close(r3) 08:49:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x257b, 0x6}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r2, &(0x7f0000000280)=0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) r3 = userfaultfd(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) r5 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x100) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}]}) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x42, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)) dup3(r0, r3, 0x0) 08:49:02 executing program 5: r0 = gettid() r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x10200, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000080)}}, &(0x7f0000044000)) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400000, 0x0) read(r2, &(0x7f0000000300)=""/105, 0x47) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0x9208, 0x2) read(r2, &(0x7f0000000040)=""/6, 0x6) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x15) timer_create(0xfe60b938f2a4542f, &(0x7f0000000000)={0x0, 0x36, 0x4, @tid=r0}, &(0x7f0000000080)) 08:49:03 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x80000001, 0xc8001) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f00000000c0)={0x3, 0x0, 0x8, 'queue1\x00', 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x101) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000180)={&(0x7f0000ff9000/0x4000)=nil, 0x6, 0x5, 0x90, &(0x7f0000ffa000/0x1000)=nil, 0x8001}) 08:49:03 executing program 4: r0 = socket$inet(0x2, 0x7, 0xffffffffffffff80) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x44001, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x4, 0x7, 0x1}) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f00000004c0), 0x0) 08:49:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:03 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x1000017f, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x10004, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r1, &(0x7f0000000480), 0x2000000000000156, 0x7ffffffff000) 08:49:03 executing program 3: r0 = socket$inet6(0xa, 0x8000e, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc008551a, &(0x7f0000001000)) 08:49:03 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaa000800000000000000450000300000000000299078c61414bbac141400030f907800000000450000000000000000000000ac1414aaac141400"], &(0x7f0000000080)={0x0, 0x0, [0xd03]}) 08:49:03 executing program 5: r0 = gettid() r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x10200, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={&(0x7f0000000000), &(0x7f0000000080)}}, &(0x7f0000044000)) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400000, 0x0) read(r2, &(0x7f0000000300)=""/105, 0x47) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0x9208, 0x2) read(r2, &(0x7f0000000040)=""/6, 0x6) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x15) timer_create(0xfe60b938f2a4542f, &(0x7f0000000000)={0x0, 0x36, 0x4, @tid=r0}, &(0x7f0000000080)) 08:49:03 executing program 2: io_setup(0x200000000003, &(0x7f0000000240)=0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x280, 0x0) ioctl$sock_bt(r2, 0x8906, &(0x7f0000000b40)="d23e630a3bb5243574e1dcef828de30e419bea92971f5f2967748c00ab091f0930456073717d7fad8637a10f13716a5648d91404a920fc0d88d3a826d094519359d85b9365749f6a402920199658055fdc7138e54da08aa971b0c9309885785dc56b2ba568cd7994306a61d7cf4f0f38f639f1384cf032f0b2a659d5ea61affb157588eb2801d6bfe914aaaea1b48cecf4c1f327ade6081a426f1b59f7c5dce1c19e526e51fac01ebcb76ee645eefac0126fa261ee88c7eed6d39b3bb4bbad85f593a05ba86af06e4faee479aa012efdfe99e2c4b9f2bbc926d22dae31472853e9aa2ec3e22f8bfa49926478e9f3516b019c348cb51ca4f55997de76dafb3da570669e3dc042ad03489790090830e6073009f9c73319a25dafa6f31bab08f2bb7f460bf9939c6f171058f610f59e39d03e23edeee1e2b9d0a3cf47af6be9c6288b9f89508535222747ff208d544cd1dfc0f199c6a9f50f20d24f0dd055d612286b2274ce9df27cb5270ad3581fedc87e072f8b6535f523c96d2147d646c822bfb23029cf19877f30993d810dd95adb2091214b16506f0effb8132407444bd73b1b54a751b51c80ebab5f84b7f6891ef9797a9dba402a6990f93b646b51a96fe7f076975d56739644b253e81e179f615abe0895d5bb7d14ecc080436d30ad28abfb61902374df61614bba14e9d56e79a9941737524a9e3ba456a33bc5f7e4ffd1fe3bf853f30f3e65be3a770e3a7dc058c4dad65fed4a6994effaff66d72e4830d693ec2460d20b83da7aee6eca1b8d38790d2f87207fb2060ce232c17d097bd10d84080b27babb6c7521939505330eac9094d74100af7c3af8860572eda628a31d23fcd57bcd2b8301af3e8f5e39e553c356b40ceefc1be42ab40a7f613ef7f9c367a3fce2b4a2aa000f305a47b01f6a99c735d2ef16940704426351a12aee34f8edb5b18af0da4e29d82cba5f49aab4ad5339f4f140c6f19b74901c3c6ee7e365a41f0688b9be99fa5b1333ba61e26521e1afe34e886449eb0c28d37fc69b76d047f4bdd7913cfd016a2ee421bc9a1c6cee893d0a7cfaa4d167130caeb1503b48e686894c0abcf75bc48a81b4f1a51241a19ce6dcbbfe153959752bcae702b5ec64357ec9ddb9b843d374aa68052b47c9b958a6171c9b325508281fb6f36e76e3a8d011b6ab79fb99705b1cb5ce747c6e4111be28ccb0150353976e9142d87f132fd19884aeb3c5d289900ea3d3ae59ad16eb2fee1e2bda2af4cbea9851f46499ce4f48a85d132c3c20c5001d9b0e351db15684df9c85467948bf9c440dd9aa0a2217ba07113ddb0724cfb89e720aae2691b35ea79a10ad9d36a98290717116d62222d6e76df6eefb6fcdaf0a05ecee13f00a54fbab822cba413159fcdd2195964ab0c96aceb9fd876c19022d5ae62c981c5e452de591f4102572722ff9f8b57014403f5a8a67a503561e0a95ccabc9b5e6a1c6b3b69ab633bf2fdb2b23d99588d8fef25a73ffb16821788ccb2c42c1be813af1fbddca7a388640a45890b026a859ddcc86787de7ed6af1fe8e309d038e1bfa1ab0f24fd09ed4365200b59f73b7669505cd66316e4f7a62d2eb529b9d59e98ebfe3ed42a2c0d1f0673cec0485ec9a3b4b02faa1065418639505258a6e71c9566fc75b641f0f6fe24209996d1cb925bc7e3f9b08fa680ddec4cf52ba693fe1641869844c36620d96bd5fc61628d222672e2cd21e115cdcc608bb76c5356c8b2e10d3035220a206ee2fee01feb056b6ecec099e55833beb9c790a1b48ba5ccb1c9fdfffd6bd3febbdba2d1b8fdf194dcde9350733bbcd3ddfd1bcd9ada509aa08317f207c031a93725b787cb0106ed5ec297f714f951246f2ea3d0d88fa7738bb4c7bbebceabd91f4f85266a31309b23f118238dbcce5676a6261f2ac1d153297e849811d4f4e01769fafde6be5e914a447256de9aa942856ea44a6c7e114544c71c0cc7c6bc8c4a62db9ee0887018f68579c9da68576347b586c6733cd3e454052679d2cf70e7d381989749b6d1742da0d1b4157fd906a8b97117e15db5dcbe3e54aefb00c4eff7b6f07a8d2cd98107ae8c61c491ebff21b3a910d1fc33fbe51554d58ac480627c75e59b0da5e03bcd3d76ee62f8e4168060ccbfd371b61ac3bcb888fe5ceccfb88e086e3c652dd748624b11ddbdde10fa35b2d37c9b571ccac748345b4d0f177c070432eef84c72b81ef9f760e7872e7437d61656ac3017829e8d4029d0ad743a0eec85ea31e442701261b34bb4456d793225339933b2f67f86cf6142decf157da995c59a81d315571f172b12620a56d0b0b6c5ba820cb8adb58fdc0231c6ac404820e1e3c50b91346a6e4bf7de48c40517259fcb0c6083b8064356717df0cb7d8d4e81d8edc271c12c7cbe5851961ff7bc64926772a89125c8aff6a11f6d2c7bd8c4db1f1cd41f3d0b14c7c5e0087b1d267c1a2452bb727cf5ed609bf09f0af59572695920c5d7a095450ee5e01616abdcd84e31f4c275a2c9b32d3063ffe24ab10a53819f1411e2b7b66918a4ddcaac05833414d0534418cf0a8fe533dea78cc022244609cd8d8fbd947a15711adb87f7be608635c0ff53c54f3f196b17f6117317f5f15c17aed6433872986d9f673bdaa0a1119ffea61c7e026f1f2fb2f1492c03de218ac89fc512d7429cffb2ad12996730afeb1c83a87f112efb541b318c983871c6c16f5b8b35bc94d5535635caf428f9618b3887560c165a1aa3a758138a3d8fc0fb979474c039c1133fc47761a3ac6953aa30ebe045c48e835d41ad79f2ba5b40b613f2d5a82f7e815a61f29b20233149206218e64907dc8e726c42dde8c55c92a47bb1f7e6cfb7d8f363d6c07c6bf5962d1519ecd71f17ce56c7f9a8346412051368e026747dc8ad097a989bcbc8fbb1477bc2503756b179dd84d571ac701050ee515af2a530cf21c133005b25d1042089f5a2a2e4931f4ea5e387417d92cc1676718e3cdaa3b2280d81a856de22fb67b766db6b9edc26cf852d57e54448ed064f673708578fe01ced30ad370bff8079889793571d47228fac172ea426dc5628ec6dc4a29276721682729f6962ae8f2e06d8f1fa0885d67572c79034b78a033b55ddb899b7bf621e6011209a38cdc6c383e2171b44217cafd2454211077936fb36bf97fb0770d6f09db4225e20b864dd5d7ec1a8557421b057f6a24abc0206f644c1968354950fbad746615a03788069032823b83b4d3135d9bed1640efe34d358aee636598577796476cfa60cd6cb94ada49eb8d66b2ed81a35e6715096d8089556a8cd64ff2c91724891fbfdc6a4631c60de50d015cccfb0cc2895dd9f2a34e6619647e7e3790f54bc8f5419bbd4b0e8ec1457e007e42627ffcc596121a48a7bc949932207e4cbad4fd95d78885dbd5983800602e77523fb94cd7d6920458a37061750eb876c939a879f266297529be9ebc199e1d19fed3e7884028158afdb35b5af35227b1e4414da036ae5689b932a0bfa26ac16ce81c1615a4c9e16ef518c13b739e286ce7c527f67db8838192207ba58171c266c3b0bdf40ca96a28f263ca8fa0754fa5975168dc19663b573923ecc1792a9aebfa3522f69fb9793498c0097acf3f20c50710a412085107851df14348f2c0ae818d4bb01e0c250682781b8a08a36e854fc793a0cc1069481d0087aae4cf1c5418d9efdc5267ac15a6948dece58c52097eeb023979ca4f1d335575a004e7d570fa1dfd75e54c3c83bb0e829d91288c5a8a4fd90c08b88125ce2fc064e2980e9d371c25082c185dd88e94c1eb4862536d2093656fbfff34e6d40cf8fd9a90be40ac6028721c91cc92ebdd90d78289c3da3f9ad6ed6df62357cc0674211214e11594aa3717ccf47a3c26edb0a611441b68c33bbc27e98663c2e8077f91f6ad47115167a8381238eb7de51059fdc6cfa9d8e3ceead9b38a37925c095ff2ea3028d3b7fcc4ca6c2891076e0d96ff755df420bbd1fc472c992b96e56cd6e17b2e1257eac32c64c5227fe5763889ebc3f969cd1d8a688ed60118ac53585007a48dfbb0a05447fec478d18ab8814ca01319196d4fc54d56f1f29f341b36c710286840261cdb87f050b9ba336a68df63046a7f2de790656a6f4619a93d06e9cb891e8f3f480bf237731dc1efa657842bf0b9e701664f41af27ecf4c71fbf5aced15664af3a1ca027f91cd8278923721261180ef6d1a2acf0685e2c89def96c521c0189421ca219d2b203093ea074c309ba453560624e7f34ada47dff18fc86e8a7727392ba02f408fec018671b8c77e1070566bddb8b0f222b786161a7a4af151665ecc2d6b6b6731adca0c1901065bae63c57dab7f94964011a7e1bc1a1ad55a1e01f6109d8e711ecf57b9a8bfd2d125519567e3eb0ea22e27ea6017797b42f6c34bbd091cd475c9a806b419fb723dfa81adda048f1bd24182bb328c3dc6e0e1a3db4046785e843f5ab6bd4ccdb4042df6888052d2c8099f9a1c03f515cac2855c41801ba33418376954c9c225890f16ef7a3de07dcacbf48dd66deef2d0269fa0d0effda562b9317d4019b5cadac3f5a235fe29b3d5619f2493a0b7dffc376f937880814ce17913ca4e1e8986097fd7ba95c1491f5ae218a3329d76d61d8a5a1c9e26d7c8756ac4d0a7d0b94dae7ce4bfadf93261f72b30833a6ed7413891271c546121e03fd2bb4f70b4d3e377c319fda3f2c5dada4236a3d346dc8043278cfc852ec85ee1016597c57a5087148bf9abd48e29dc5ffd1984fb863a10b8f24bf9c2ba7e5e7e9fc5bcdfc8c11d1947aff150d9f9f7ba7fbe7d112c84afeaa0d0fd1ee959c0cbc294caa33213659dbe46b0f5e70d664cd14dd21425040a3bdbb70f2bf73c8599146bc79863677da477021bf92358b23c118848e42a0f47260357f69a744334fdb713719671e603bcd1583147a5dc428ac1d86b7081cd124bed5a89b497cbe232ea6d2ac7ca4745c62c7e079657099793887d8564e1fef822b211b0ae9a420842d223f4c22cf2ef28cc95e88ca49bcbd367e9842d29ccbeea8b825afaa1ab0c6476bd0e05b3010e625eb2b7fbb17b5caf3668ae181e947aa8a9933291c5ccf767f5626737bd5e18b0eecbd0428b43a0423bdbad67c70a18f5aef310d4f02e591cefe91b0b7d3ef19ec9629255a0633f50a1475bd2ea331c0e6abdfecd8e45655efc1d88893a2d9b0b9914a67aba58ee670be44cbc5f4c3e4af7cc48a706848be75b90a58bbce4e6eb612d5c771fd23b37c73c4637afece2c0ab3a4dd902303d37f5c98f0cfe157175208505d09ef36f173f49deb422afacf4ae8533718e2e3ac6ca2c9f18bd5f812669e3d30a177a93fbd274893eccd002185b88bf97a1fa3dbfcaf1d25f370777f739a18bfe9f081cc4375ffa52a12fc305b87d76c88a59fe8514e529add2e4a782d03db8492465706df39b50aecd82fd35d1e23b488cfe6cd5c300a6cc91a4adea705428f3dae517d980a8a4f4ae836ba30afb69f71a43b91b171c837e2104a885ea5e911a176225745d632389e2ce7792c5d5b7038780a3021be0c800a6cdbadf286851e193591fa7859ff0cf55ba70b2888599c5331949ffcc93a9c70ce660ba34a3a0c6d0e2d48900e09c2bc5dd9dd9275af006f57e50db0d741c0ef8bcf62a60ac9b27d2f9faacf672dabb91ae0012561da3ef2a6fcf31bbf9ed00c7884d5b3b5f7b1a7ef46b1c14ac30b42cb79b5cdd690fca46ad03a8579a0cfca63a84891a6771d2e064265f3813d5fc5e7e2d8b5f304c0031d3f5d3e7b8e67c48b4eca46de") close(r1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200200, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x1, 0x5, &(0x7f0000000080)=0x1000}) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x480000, 0x0) 08:49:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="34000002000000000000000000000004080000140003007465616d30000000000008000000000000000000000000000000000000"], 0x34}}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0xffffffffffff5ecc, 0x400) getsockopt$inet_mreqn(r1, 0x0, 0x400000000000027, &(0x7f00000001c0)={@local, @multicast1, 0x0}, &(0x7f00000000c0)=0x17d) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth1\x00', r2}) 08:49:03 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f00000015c0)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000140)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) recvfrom(r1, &(0x7f0000f9cf9b)=""/101, 0x65, 0x120, 0x0, 0x0) 08:49:04 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffffd, 0x40100) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000080)={0x100000001, "20f18c94ff9d06a34e92250a8d214994ad345b56e2f8467db99c780ea68e18fd", 0x1, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r1, 0xfffffffffffffffd, &(0x7f0000000040)) 08:49:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x8) renameat2(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="509f688c4d", 0x5) r3 = accept4(r0, 0x0, &(0x7f0000000200)=0x350, 0x0) recvmmsg(r3, &(0x7f0000001a80)=[{{0x0, 0x0, &(0x7f0000001980), 0x0, &(0x7f0000001a40)}}], 0x500, 0x0, &(0x7f0000001ac0)={0x77359400}) [ 289.190334] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:49:04 executing program 5: openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0xc00, 0x0) r0 = socket$netlink(0x10, 0x3, 0xa) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001300290a00000000000000000700ec70", @ANYRES32=r1, @ANYBLOB="000000000000000008000c0011000000"], 0xffd7}}, 0x0) 08:49:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:04 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) io_setup(0x8, &(0x7f0000000080)) write$eventfd(r3, &(0x7f0000000140), 0x8) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000bc8000)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x2000)=nil, 0x2000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r2, r1, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) dup2(r0, r4) 08:49:04 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000040)="1f0000000104fffffd3b9ec007110090090501000b000200000010d10200cf", 0x1f) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x800) 08:49:04 executing program 5: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f000079df88)) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0100fffffff00000"], 0x8, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x4ea1, 0x8102) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)='/dev/sequencer2\x00'}, 0x30) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000200)=r2) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8001, 0x0) write$P9_RRENAME(r3, &(0x7f0000000080)={0xfffffffffffffe86, 0x15, 0x800000000001}, 0x8f) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x2) msgrcv(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xc0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) [ 289.644722] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 289.724248] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 08:49:04 executing program 2: unshare(0x400000000010801) r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) r1 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000140)=""/81) 08:49:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@nat={'nat\x00', 0x19, 0x3, 0x43f, [0x20000b40, 0x0, 0x0, 0x20000db8, 0x20000de8], 0x0, &(0x7f00000000c0), &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x4b7) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000200)={0xbf5, {0x1000, 0x8001}}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x92500, 0x0) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f00000006c0)=0x2) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000180)="f346aa4ce6205b725a302771ea0a1b4dfc51f1ea2d2af42bb5ba941584f2e6396284fafd343b88ee9058d541a05a96c09adacbbf00daac82de4f147ac8c811930b08953db69f24a30771cf51cb6cc9f12116e2854eabc92e1b2fab26fdc915963aa6ca852b665a50e1377a7d1f17b5ecedaad9b64149420238", 0x79) r2 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x82, 0x300) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) renameat(r2, &(0x7f0000000700)='./file0\x00', r2, &(0x7f0000000740)='./file0\x00') r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x100, 0x42) unlinkat(r3, &(0x7f0000000100)='./file0\x00', 0x200) 08:49:05 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000f61000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) io_setup(0x8, &(0x7f0000000080)) write$eventfd(r3, &(0x7f0000000140), 0x8) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000bc8000)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000011000/0x2000)=nil, 0x2000}, 0x1}) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x1c) tee(r2, r1, 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0x12) dup2(r0, r4) [ 290.286055] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 08:49:05 executing program 5: r0 = socket$unix(0x1, 0x805, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r2, r3) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) setgid(0x0) listen(r0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) dup2(r4, r0) [ 290.377112] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 08:49:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:05 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x100, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x18}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) 08:49:06 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ff8000/0x5000)=nil, 0x5000}, 0x3}) r1 = socket$inet(0x2b, 0xfffffffffffffff, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) select(0x40, &(0x7f0000000040)={0x1000, 0x5d, 0x200, 0x6, 0x2, 0x5, 0x20, 0x9}, &(0x7f0000000080)={0xfffffffffffffff9, 0xffffffffffffff80, 0x6, 0x1, 0x7e, 0x6, 0x4, 0x2f8f}, &(0x7f00000000c0)={0x2d, 0x800, 0x7, 0x2, 0x6, 0x3, 0x3, 0x8eb}, &(0x7f0000000100)={0x0, 0x2710}) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @rand_addr}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 08:49:06 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x1a1, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) 08:49:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000080)={0x18, 0x14, 0xc01, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 08:49:06 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x10102) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000080)) sendfile(r1, r0, &(0x7f00000000c0)=0x1fffffc, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000140)={0x7, 0x70, 0x8001, 0x7, 0x6, 0x8, 0x0, 0x2104, 0x4004, 0xb, 0x6, 0x5, 0x8913, 0xcfc3, 0x1, 0xfffffffffffffff8, 0xfffffffffffffffc, 0x4, 0x2f37, 0x9, 0x10000, 0x3, 0x7, 0x200, 0x834, 0x50, 0x10001, 0x6, 0x1000, 0x5, 0x3, 0x0, 0x7fffffff, 0x9ce0, 0x8004, 0x0, 0xc7b, 0x7, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x1800, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffff7, 0x42}) 08:49:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000006000)='/dev/ppp\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0xff8}, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x1, @win={{0x45b, 0x6, 0x5daea570, 0xe5}, 0x0, 0x0, &(0x7f0000000040)={{0x4, 0x7, 0x8, 0x8001}}, 0x10000, &(0x7f0000000080)="0eb251db66d191bf5b98b39916b434adfa3aeecec99030afc1b9a78a073f9cab9026adf546d2ffb081ba49263712a8c8fc45ce725a79c90338", 0x1}}) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x4, 0x9, 0x5f5, 0x2, 0x14a, 0x10000, 0x401, {0x0, @in={{0x2, 0x4e23, @remote}}, 0x10000, 0x777, 0x1, 0x7fff, 0x1}}, &(0x7f0000000380)=0xb0) openat$md(0xffffffffffffff9c, &(0x7f0000000840)='/dev/md0\x00', 0x200, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000440)={"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"}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x2, 0x7, 0x8000, 0x2, 0x2, 0x2, 0x0, 0x8000, r1}, &(0x7f0000000400)=0x20) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000d40)={"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"}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) 08:49:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000086eff0)={0x2, 0x4e22, @multicast2}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2, 0x9}, 0x1c) 08:49:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) 08:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x44, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x100000001, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000040)={0x1, 'ip_vti0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'veth0_to_bridge\x00', 0x8}, 0xe5) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) fstat(r0, &(0x7f00000005c0)) getegid() stat(&(0x7f00000030c0)='./file0\x00', &(0x7f0000003100)) lstat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000004840)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004880)={{{@in6=@remote, @in=@loopback}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000004980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a40), &(0x7f0000004a80)=0xc) getgroups(0x2, &(0x7f0000004ac0)=[0xffffffffffffffff, 0x0]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005880), &(0x7f00000058c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000005900)={{{@in6=@dev, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005a00)=0xe8) getgroups(0x1, &(0x7f0000005a40)=[0xee00]) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000005bc0)=0xe8) lstat(&(0x7f0000005ec0)='./file0\x00', &(0x7f0000005f00)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x9, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f00000000c0)={0x8000, r3}) stat(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)) getpgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006040)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000006140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006280)=[{&(0x7f0000000c40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000fc0), 0x0, &(0x7f0000003240)}, {&(0x7f0000004c40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000050c0)=[{&(0x7f0000005080)}], 0x1, &(0x7f0000005200)}], 0x2, 0x14) mount(&(0x7f0000000440)=ANY=[@ANYRES16], &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) 08:49:06 executing program 0: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) ioctl(r1, 0x20000000008912, &(0x7f0000000140)="0a5c2d0240316285717070") r3 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x20012, r4, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xffffffff, 0x80) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008000)={0x44, 0x0, &(0x7f0000004fbc)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f000026c000)=ANY=[@ANYBLOB="8561646600000000", @ANYPTR=&(0x7f00004edf8a)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000000000000000000000000000000000000"], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="47144f0a677ab8d0f49da087fdc839b439a6d5e65839d4d200359b04e4c198b7"]], 0xfffffffffffffda3, 0x800020, &(0x7f0000009000)}) ioctl$int_out(r0, 0x5462, &(0x7f0000000100)) 08:49:06 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000006000)='/dev/ppp\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0xff8}, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x1, @win={{0x45b, 0x6, 0x5daea570, 0xe5}, 0x0, 0x0, &(0x7f0000000040)={{0x4, 0x7, 0x8, 0x8001}}, 0x10000, &(0x7f0000000080)="0eb251db66d191bf5b98b39916b434adfa3aeecec99030afc1b9a78a073f9cab9026adf546d2ffb081ba49263712a8c8fc45ce725a79c90338", 0x1}}) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x4, 0x9, 0x5f5, 0x2, 0x14a, 0x10000, 0x401, {0x0, @in={{0x2, 0x4e23, @remote}}, 0x10000, 0x777, 0x1, 0x7fff, 0x1}}, &(0x7f0000000380)=0xb0) openat$md(0xffffffffffffff9c, &(0x7f0000000840)='/dev/md0\x00', 0x200, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000440)={"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"}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x2, 0x7, 0x8000, 0x2, 0x2, 0x2, 0x0, 0x8000, r1}, &(0x7f0000000400)=0x20) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000d40)={"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"}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) 08:49:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000100)={0xb1, "2a9698bdee98c9ae3e46f5fbc8e1e01de0b0eabfbb2d17ba9c0ede49ef8a2f09b1528bde1e6577e3bdbb973da01d92dec7d3d39a5c8f9bfb82b1a60286d25b34e64aff5c1a740fe28bc772eb279ba57722d700068e1403592e2420cb7cca67b101d8050feef4860e6e7c568f41fe9db19158a1e623aa473190b54d1dcc23f3d652740706a2f72f968e4f114497675248c150c5a5d10745eb70f3a8dc76ade9fbbf35b777668687fa555d772e51ceb33325"}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x6000, 0x0, 0x10024}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[]}}, 0x4000000) [ 291.947718] IPVS: sync thread started: state = MASTER, mcast_ifn = ip_vti0, syncid = 0, id = 0 08:49:07 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20600, 0x0) r1 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000200)={{0x5, 0x4, 0x3, 0x9, 'syz0\x00', 0x6}, 0x3, 0x100, 0x0, r1, 0x3, 0x0, 'syz0\x00', &(0x7f0000000180)=['.\x00', '#\x00', 'posix_acl_accessposix_acl_accesssecuritylo[\x00'], 0x30, [], [0x2358, 0x4, 0xc7, 0x1]}) mkdir(&(0x7f0000000340)='./control\x00', 0x2) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) close(0xffffffffffffffff) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)=0x1) sendmsg$alg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000400)="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", 0xfb}, {&(0x7f0000000500)="25a8505645afd2d0e1eb4103f6b1b179d680ae0c42788ce0b0a6758627a23fd5051599f55482ef72fb11fc5914ade83b31b7bab0119dc5f28cae78e37a3f0a29e030a51c668fd5e9e6f5da2d68480fe6b59e681decbd090ce6447e56783ce640299f830e072070a82e514a252155ec198013bf0401d601ae964e167a6dcc5f0b2b13a087c311c7cc703bdbfea97a75854e777efc967a7fb646e81d856118516531", 0xa1}, {&(0x7f00000005c0)="a64f65823bfe22d252311458af83ebfe413e577a37d7fcba3210beaacd89b2ac7b820e5487716c5613c61e63488bc83c81ef336368549635c09ec35b14cd09b310340cd286fc612b8abdc28bad6dfc168118f31bd54c9924", 0x58}, {&(0x7f0000000640)="c37a00f8c2e291c38c813707ca7c0184193b3687970ac9783829861a1695a899a3a8f21450c3234d5779cc53ba4a691ec9b02e952d09e2e0aa36481417a6569209bf2068da41c71977aa63c7a1cfd3350bad0010a33ec9b93c2e0d7aed30b53a36e1e07efd340302ab", 0x69}], 0x4}, 0x3bb9e633f684e5ba) r2 = inotify_init1(0x0) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/200, 0xc8}], 0x1) fcntl$setsig(0xffffffffffffffff, 0xa, 0x800000000000) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0) [ 292.045220] binder: 8393:8398 got transaction with invalid offsets ptr [ 292.052347] binder: 8393:8398 transaction failed 29201/-14, size 40-8 line 2998 [ 292.145497] binder_alloc: binder_alloc_mmap_handler: 8393 20000000-20003000 already mapped failed -16 08:49:07 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000080)='ns/user\x00') socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000340), &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000280)) ioctl$FS_IOC_GETFLAGS(r1, 0xc0189436, &(0x7f0000000040)) r3 = socket(0x4, 0x80007, 0x3) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x7ff, 0x8000}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000480)={r4, 0xd5, "6ccf23f2cd44a18a3cc100f063173a906c9c3453f53b221e867a3d63f1a6eb9228c3400424cd040faf6c166dd02f381e500b1498cd71b9cf5522b3a5d56359db48f7d21bc8aa9eeb905455ebe55616681c89e7b30f48d16682450bf578b32c1a6d7fdb115bf7e22b85adcda3675f47a57102a77ac6fdec4de6524c13a59500221553cf0b8c47a8303d2e7dec7607699f6ce0b60fe8d1bc171ca3f98b55986e4e06b1273fdcdc2db366d29bcd2315e31ce040b498e770ba7431983483d25c2c504f168e74b40bfcb5236a2a21a11e99396a7b550ee3"}, &(0x7f0000000580)=0xdd) r5 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x80000) r6 = getuid() sendmsg$nl_generic(r5, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)={0x144, 0x3e, 0x400, 0x70bd26, 0x25dfdbff, {0x1f}, [@generic="7497dac45b78a19fd3293f6e48b26526f31e87f2341749198f5b585e79296deff25db87c1ac9a9ba52b10243e49d955d7831fd2eebc1f40bbee1e67d1d97db5d62b5dc08aaf1839ad1d16a71dce7b3aad27e857257c5271480016f537a29f5a3d7c199e777c7b776434bdf3afebe6b1210b6f076e0eff18a9fe45baf362d090d7d8ddbaf3fe2dd4cb32a66a1860d586364bc8ee950122e784c3a8356e0af7266b8af3afc82547cb9", @typed={0x8, 0x3d, @uid=r6}, @nested={0x18, 0x54, [@typed={0xc, 0x2b, @str='ns/user\x00'}, @typed={0x8, 0x8a, @fd=r1}]}, @generic="f633eb683ce569fbfe2f65ee63bb18edc0b47b64a48069fa43803769d270a9e9abec10bec8efbe696d2704099a31f7eee20089f7cc0193aa5b2568ba068150133c08aaf20b5b738246d33d4ddac1cb951c9a4d1a3821d135", @typed={0x8, 0x71, @u32=0x1}, @typed={0x8, 0x36, @u32=0x2e90}]}, 0x144}, 0x1, 0x0, 0x0, 0x20004011}, 0x40000) [ 292.197758] Unknown ioctl -1055894255 [ 292.213379] Unknown ioctl 25648 [ 292.215266] binder_alloc: 8393: binder_alloc_buf, no vma [ 292.217051] binder: BINDER_SET_CONTEXT_MGR already set [ 292.222564] binder: 8393:8406 transaction failed 29189/-3, size 40-8 line 2970 [ 292.227775] binder: 8393:8408 ioctl 40046207 0 returned -16 08:49:07 executing program 4: r0 = memfd_create(&(0x7f0000000840)="656d30e6d0657270722ac8a9f5b38e25e2dd6f632500630e0489c98b1d06285cc037e956cdf575b04dbf8f009383c6fbcb84fb772a2624599e6f02ba896ccbb0030005d05c2943d24c16ddc9c196e49095f7c1eb5e0e70909c61e6ff8464cddd603a55ee471fe6e186e1b4ba9629c6b8bbd80de2a9e90934e58f1f881b1dc8f91ada3acd2dda93e27718e107b0c2228c1cfac540b9773aee7983eb21090124e61a1b7c10d6ae3b7e41450c306bcb6ae6538d1f5ea3ae4e8020e659e8a8fd22b9cb459d08ead0e9721c580a098839a7434190d7bc26ae008915c41efb175ddaefee25bb94a93624ce19b548731ac08f1351f5f09c13acd2b8afb09651", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79d28e317994ace19c424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d3248c858b41476ce826511126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e56d8bb054222746bcc5730") ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000000), 0x1080005000) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x400) [ 292.303166] Unknown ioctl -1055894255 [ 292.320344] Unknown ioctl 25648 08:49:07 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = epoll_create(0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) pwrite64(r3, &(0x7f0000000080)="1a42039e2857edc6c148385ec19e9c021aaa296e9a8e1207490d2e0e083abe329d54b0c3fad12cc573126be87956ae13a9232ed5d7a6b3d637f97fdaeae5a5a492d77d4d540a0ca500c47a63ced486b8bcdee0c530e3846e9ebb944cf630177e24fa3f424ed5620d8ab9478de0b8ceb2082da3cdc6d65dcc175ed0af8d41974024517a682a4eb890e7cd1f4518fa7dc5", 0x90, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r5 = epoll_create(0x3) ioctl$TIOCNXCL(r4, 0x540d) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) 08:49:07 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) fcntl$lock(r0, 0x24, &(0x7f0000000040)={0x3, 0x1, 0x9, 0x0, r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4c, 0x0, &(0x7f0000000180)=[@reply_sg={0x630d, {{0x630c, 0x630b, 0x40486312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0)}}}], 0x0, 0x0, &(0x7f0000000500)}) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000540)=0xe8) getresgid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) fstat(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getuid() lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000000a80)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000200)="f8c27074cd7405e311387a5efd4bc585cf59f8b66a91616ac3df72", 0x1b}, {&(0x7f0000000240)="05c077a8dfb4dd62", 0x8}, {&(0x7f00000002c0)="1389297b462fdf0b28cc2e2f744d5ee39cd29fbfdb2593e50974c77f2f3d910fa041b94a1ff0e5c447bf4ff37533b2f33bdf1ea7cbe039498a59807536ca05790fcc14c3ff8db16891802c6edf0f8fd2c15a7cbb3d1b25c939aedf", 0x5b}], 0x3, &(0x7f0000000980)=[@cred={0x20, 0x1, 0x2, r1, r4, r5}, @cred={0x20, 0x1, 0x2, r1, r6, r7}, @cred={0x20, 0x1, 0x2, r1, r8, r9}, @rights={0x18, 0x1, 0x1, [r2]}, @cred={0x20, 0x1, 0x2, r1, r10, r11}, @rights={0x28, 0x1, 0x1, [r0, r3, r0, r3, r2]}, @cred={0x20, 0x1, 0x2, r1, r12, r13}], 0xe0, 0x800}, 0x4000) 08:49:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000080)=0x5, 0x4) sendmmsg(r1, &(0x7f0000000000), 0x40000000000037f, 0x0) 08:49:07 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e1f, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x3c, &(0x7f0000000000)=[@in={0x2, 0x4e22, @rand_addr=0x20}, @in6={0xa, 0x4e20, 0x1, @mcast1, 0x4}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0xfffffffffffffffd}, &(0x7f0000000200)=0x8) syz_emit_ethernet(0x2a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa76c2aaaaaaaa08004500001c0000000000119078ac14140be800000100004e21000890784c73eeb65ea6ee10f842b4130885c3f59fb5577122741eec16a1e7736a085cde24a09b3b6c9bf93185819acef840376ceebbc34ad1ef07d1d2b7575c8646548393b6b38f02fec374ce48b572c3150aa22a83f09577a52ffae5f558d6887005350454357e21b7e4b06b1c980000000000000000"], 0x0) [ 292.730273] binder: 8425:8427 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER [ 292.738550] binder: 8425:8427 got reply transaction with no transaction stack [ 292.746082] binder: 8425:8427 transaction failed 29201/-71, size 2305843009213693952-2305843833847414784 line 2762 08:49:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:08 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x10, 0x800000000000802, 0x0) sendmsg$netlink(r1, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740), 0x0, 0x0, 0xfffffffffffffe3e}, 0x0) write(r1, &(0x7f0000000200)="240000001a0025f00485bc04fef7001c020b49ffed000000800008000800100001000000", 0x24) [ 293.066056] binder: undelivered TRANSACTION_ERROR: 29201 08:49:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r1, &(0x7f0000000280)="040105000500000000000000ffb2", 0xe, 0x0, &(0x7f0000000000)={0xa, 0x100200008906, 0x4, @local, 0x2}, 0x1c) 08:49:08 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'tunl0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000001380)={&(0x7f00000001c0), 0xc, &(0x7f0000001340)={&(0x7f00000012c0)=ANY=[@ANYBLOB="54000000140001000000000000f1060009800000", @ANYRES32=r1, @ANYBLOB="140002000000000000000000000000000000000114000100ff0200000000000000000000000000011400060000080000060000000000000000000000"], 0x54}}, 0x0) 08:49:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:08 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x0, 0x1) r1 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='et0+\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffffd) keyctl$revoke(0x3, r1) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f0000000240)=0x5) 08:49:08 executing program 4: r0 = memfd_create(&(0x7f0000000840)="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", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79d28e317994ace19c424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d3248c858b41476ce826511126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e56d8bb054222746bcc5730") ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000000), 0x1080005000) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x400) 08:49:08 executing program 3: r0 = memfd_create(&(0x7f0000000840)="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", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79d28e317994ace19c424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d3248c858b41476ce826511126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e56d8bb054222746bcc5730") ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) fcntl$setstatus(r1, 0x4, 0x4000) sendfile(r0, r1, &(0x7f0000000000), 0x1080005000) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x400) 08:49:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000080)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000000)=0x57) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f11ec44bc814df0fdb3de28c670a478899693463416f7adafbf0eba39dd3aa3c4ea2f00981e46a94407d523c2e2e40115bc5a550db928cb91d1f191d25c83090", "750de875f5232daab23fa4b8da7c66796652738324a27348bf3cd5c9ce3a8bc9"}) 08:49:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:08 executing program 2: nanosleep(&(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100)) r0 = socket(0x1e, 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r1, 0x502, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x38}}, 0x4000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x400}) 08:49:08 executing program 0: r0 = socket$kcm(0xa, 0x20000000002, 0x11) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in={0xa, 0x4e23, @remote}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000140)}, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000500)=""/219, 0xdb}, 0x2020) 08:49:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:09 executing program 5: mq_open(&(0x7f0000000380)='@-^/$vboxnet0+cpuset/.@ppp1\x00', 0x800, 0x0, &(0x7f00000003c0)={0x7, 0x4, 0xff, 0x4, 0x1f, 0x8, 0x2, 0xfffffffffffffff9}) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/231, &(0x7f00000002c0)=0xe7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000180), 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x20c02, 0x0) write$P9_RWALK(r1, &(0x7f0000000300)={0x7e, 0x6f, 0x1, {0x9, [{0x40, 0x4, 0x5}, {0x12, 0x2, 0x7}, {0xca548e5b2b36211f, 0x2, 0x4}, {0x24, 0x4, 0xfae1}, {0x10, 0x0, 0x2}, {0x1, 0x2, 0x3}, {0x40, 0x1, 0x3}, {0x40, 0x1, 0x7}, {0x80, 0x0, 0x3}]}}, 0x7e) 08:49:09 executing program 0: r0 = socket$kcm(0xa, 0x20000000002, 0x11) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in={0xa, 0x4e23, @remote}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000140)}, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000500)=""/219, 0xdb}, 0x2020) 08:49:09 executing program 2: nanosleep(&(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100)) r0 = socket(0x1e, 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r1, 0x502, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x38}}, 0x4000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'nr0\x00', 0x400}) 08:49:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 294.493580] IPVS: length: 231 != 8 08:49:09 executing program 4: unshare(0x20400) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000002c0)={0x0, 0xfffffffffffffffd, 0x0, 0x0, "00a1ac7f8ecf60200100820cda099bfd1846a86d4deeaebde90400"}) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback}, &(0x7f0000000040)=0xc) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x1, r2, 0x3b, 0xffffffffffffff9c}, 0x10) [ 294.557524] IPVS: length: 231 != 8 08:49:09 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000180)=ANY=[]) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000100)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x0, r1}) epoll_create1(0x80000) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000580)={0x1, 0x0, &(0x7f00000007c0)=""/213, &(0x7f0000000140)=""/118, &(0x7f00000004c0)=""/165}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000000300)={0x3059cba9, 0x1, {0x1, 0x3, 0x1000, 0x0, 0xffffffff}}) ioctl$BLKPG(r2, 0x1269, &(0x7f00000002c0)={0x7, 0xfff, 0x30, &(0x7f0000000280)="3d5a0920eaff43c131201d28b8e34b57301514a073f7cbaf5b1a6b3c63e714a70a19fcb70e229282473d450548d469ce"}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x0, 0x1, &(0x7f0000000080)=""/115, &(0x7f0000000400)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)=0xfffffffffffffffc) 08:49:09 executing program 3: unshare(0x20400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1ff, 0x4000) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x15d, 0x7, 0x8, [], &(0x7f0000000080)}) getsockopt$inet_int(r0, 0x10d, 0x0, &(0x7f0000000000), &(0x7f0000000140)=0x4) 08:49:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:10 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) socketpair(0x15, 0x8000f, 0x81, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000040)) listen(r0, 0x0) listen(r0, 0x0) 08:49:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:10 executing program 4: unshare(0x20400) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000002c0)={0x0, 0xfffffffffffffffd, 0x0, 0x0, "00a1ac7f8ecf60200100820cda099bfd1846a86d4deeaebde90400"}) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback}, &(0x7f0000000040)=0xc) bind$xdp(r1, &(0x7f0000000080)={0x2c, 0x1, r2, 0x3b, 0xffffffffffffff9c}, 0x10) 08:49:10 executing program 0: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000280)=0x10, 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x80000000, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x12c9}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r3, 0x20}, &(0x7f0000000100)=0x8) 08:49:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x10000, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x3) sendto$packet(r1, &(0x7f00000002c0)="7ae3f3172bbd811211bcece97d1af436ff46dc852912c77e0bfb83741b7d84bcf273c1dc0a22806df3ae50531f81f1db64d0de22b6cbc7898916716484b76589fed1902745e419ae8f5fafc39ac6e5cafa4e768adf31bcf92797571137a47c61da5e085f3143a2a0382f34e6786e67e9b8", 0x71, 0x20000000, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @remote}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@local, @in6}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ec0)=0xe8) accept$packet(r1, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001040)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001140)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4100084}, 0xc, &(0x7f00000013c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="04020000", @ANYRES16=r2, @ANYBLOB="00022555e7c4cb0929df1a000000"], 0x204}, 0x1, 0x0, 0x0, 0x240400d5}, 0x4000040) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) write$FUSE_WRITE(r0, &(0x7f0000000200)={0x18}, 0x18) 08:49:10 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000100)=0x5, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x269) sendto$unix(r0, &(0x7f0000000280), 0x0, 0x8000, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/175, 0xaf}], 0x1) sendmmsg$unix(r0, &(0x7f0000005dc0)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000300)="0b770ce2", 0x4}], 0x1, &(0x7f0000000000)}], 0x1, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) 08:49:10 executing program 2: r0 = socket(0x10, 0x802, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000100)=""/6, &(0x7f0000000140)=0x6) write(r0, &(0x7f0000000000)="240000001a0025f00025b4f7fdff141c0a0b5aff6e10b500000780cc08001b000100006e", 0x24) r1 = dup(r0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x100, 0x0) [ 295.478541] raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it! 08:49:10 executing program 4: r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10, 0x800) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'ip6_vti0\x00', {0x2, 0x4e24, @broadcast}}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f00000034c0), &(0x7f0000003480)=0xfebc) 08:49:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="e5", 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000040)={r1, 0x80000, r0}) [ 295.554522] netlink: 'syz-executor2': attribute type 27 has an invalid length. [ 295.636389] netlink: 'syz-executor2': attribute type 27 has an invalid length. 08:49:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)="5a918c67a9", 0x5) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="02000000010006000000000002000600", @ANYRES32=r2, @ANYBLOB="02000300", @ANYRES32=r3, @ANYBLOB="02000100", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r5, @ANYBLOB="6defb8b799deebf865d22fa7", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r7, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="10000400000000002000040000000000"], 0x5c, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f000001b000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f00000002c0)="66b99408000066b81e111ee366ba25b5a6000f303681950d00918e66b80b0000000f23c80f21f86635080060000f23f83e0f009125000f381ee594360f320f019dfc32f20f01c98395008800", 0x4c}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$void(0xd) r10 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r10, 0x8018456f, &(0x7f0000000100)=""/169) ioctl$KVM_RUN(r9, 0xae80, 0x0) 08:49:10 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x6, 0x6, [0x80000001, 0x2, 0xe, 0x1, 0x2, 0x5]}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x7ff}, &(0x7f0000000140)=0x8) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c0045005, &(0x7f0000000000)=0x10000) 08:49:11 executing program 4: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$addseals(r0, 0x409, 0xf) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 08:49:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getattr(r1, &(0x7f0000000080), 0x30, 0x0) sendmsg(r0, &(0x7f0000013000)={&(0x7f0000013fe4)=@in6={0xa, 0x4e23, 0x0, @loopback}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000040)=[{0x18, 0x29, 0x5, "27020201"}], 0x18}, 0x0) 08:49:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x1) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140), 0xc) getcwd(&(0x7f0000000000)=""/226, 0xe2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) 08:49:11 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) ioctl(r0, 0x80000004147, &(0x7f0000007fff)) 08:49:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x10000, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x3) sendto$packet(r1, &(0x7f00000002c0)="7ae3f3172bbd811211bcece97d1af436ff46dc852912c77e0bfb83741b7d84bcf273c1dc0a22806df3ae50531f81f1db64d0de22b6cbc7898916716484b76589fed1902745e419ae8f5fafc39ac6e5cafa4e768adf31bcf92797571137a47c61da5e085f3143a2a0382f34e6786e67e9b8", 0x71, 0x20000000, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @remote}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@local, @in6}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ec0)=0xe8) accept$packet(r1, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001040)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001140)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4100084}, 0xc, &(0x7f00000013c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="04020000", @ANYRES16=r2, @ANYBLOB="00022555e7c4cb0929df1a000000"], 0x204}, 0x1, 0x0, 0x0, 0x240400d5}, 0x4000040) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) write$FUSE_WRITE(r0, &(0x7f0000000200)={0x18}, 0x18) 08:49:13 executing program 2: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x14b502, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x2969}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={r3, 0x7, 0x30, 0x4, 0x40000}, &(0x7f0000000240)=0x18) ioctl$sock_ifreq(r2, 0x8931, &(0x7f0000000000)={"697036746e0600000000000000000800", @ifru_data=&(0x7f00000000c0)="a32fd3c91116bf66fed2b246a94500aa6593352d29be1746fd84168b6ef37b32"}) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000140)={0x7, 0x162d, 0x1}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000280)={{0xa, 0x4e23, 0x3, @remote, 0x7}, {0xa, 0x4e24, 0xd0, @mcast1, 0x1ff}, 0xe1e7, [0x80, 0x0, 0x0, 0x2, 0x7, 0x6, 0x2, 0x100000001]}, 0x5c) 08:49:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x80008913, &(0x7f00000000c0)="8d1e00d38673a0d9c50000") r1 = socket$inet(0x2, 0x200000001, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e0000001ac1414aa013a6859bd03000000000001"], 0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = shmget$private(0x0, 0x3000, 0x5, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_LOCK(r3, 0xb) sendto$inet(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) 08:49:13 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000180)={0x1, 0x3}, 0x2) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='/dev/userio\x00', 0xfffffffffffffff8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0xa, 0x98) getsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000001c0)=""/126, &(0x7f0000000240)=0x7e) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) 08:49:13 executing program 3: socket$inet(0x2, 0x3, 0x6) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000000)={0x10, 0xf}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x1f, 0x200100) msgget(0x1, 0x8) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000140)={r2, 0x2}) 08:49:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 298.680454] syz-executor0 uses obsolete (PF_INET,SOCK_PACKET) 08:49:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x10000, 0x0) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x3) sendto$packet(r1, &(0x7f00000002c0)="7ae3f3172bbd811211bcece97d1af436ff46dc852912c77e0bfb83741b7d84bcf273c1dc0a22806df3ae50531f81f1db64d0de22b6cbc7898916716484b76589fed1902745e419ae8f5fafc39ac6e5cafa4e768adf31bcf92797571137a47c61da5e085f3143a2a0382f34e6786e67e9b8", 0x71, 0x20000000, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(r1, &(0x7f0000000480), &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000cc0)={@broadcast, @remote}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@local, @in6}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000ec0)=0xe8) accept$packet(r1, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001040)={{{@in, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001140)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4100084}, 0xc, &(0x7f00000013c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="04020000", @ANYRES16=r2, @ANYBLOB="00022555e7c4cb0929df1a000000"], 0x204}, 0x1, 0x0, 0x0, 0x240400d5}, 0x4000040) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) write$FUSE_WRITE(r0, &(0x7f0000000200)={0x18}, 0x18) 08:49:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:14 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bpq0\x00', r1}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x800) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000100)=0x2) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000180)={0xf000, 0x8000}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r3, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xb, 0x24010, 0xffffffffffffffff, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000200)) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f00000009c0)={0x100000000, 0x0, &(0x7f00000002c0)="2703ec685a679987e08671db709b2cd8cfef67949c4f", &(0x7f0000000a00)="128c160d50c776d394252b54f6902556d522a8d9c6ad3e4d83a1c64ac8a8f0ea4a5d7737e349a42c58ece139075137b704d6c2bea50257be4192725d7693eadf0a436d052c996d37c4a495f2e5b50ed20da0b1fa4f3e20afe353ccd6ded8f058130fb910135fb7526ea0bcee963305a99b5c4b782564bc7e5847a99c88cb9c822737272f68e243c01aabd48d6727853ba5bcfc24bb961560368afe39786e1b2cbd47b45d3782a685492cbd57dc6af3587e227cfd35", 0x16, 0xb5}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$int_in(r4, 0x800000c0045006, &(0x7f0000000280)=0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x520d0000, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 08:49:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:16 executing program 5: mkdir(&(0x7f0000000700)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xe89, 0x4, 0x8000}, 0x4) umount2(&(0x7f0000b1d000)='.', 0x4) setsockopt$inet_dccp_int(r0, 0x21, 0x11, &(0x7f00000001c0)=0x400, 0x4) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000100)=0x4) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=""/250) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000140)=0x1, 0x4) 08:49:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:16 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffff, 0xa00) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000240)={'nat\x00', 0x3, [{}, {}, {}]}, 0x58) r2 = semget(0x3, 0x2, 0x1) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000200)=""/60) writev(r1, &(0x7f0000fdbff8), 0x100000000000012f) r3 = fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r0, &(0x7f0000000080)={r0, r0, 0x9}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x80000000db3, 0x82, 0x2892, 0x776, 0x800}, &(0x7f00000000c0)=0x14) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)={r5, 0x59, "5dc6ab3f47dc22e7988f0b5ee49811b2b7565951e352ebd37f2737303a29291a0d9d2b60f69ae515ff24b6a687c305c91deed10b7f8e51f579f80934c6c6a49616483a62b393ef7478d233e143e16937beb9187d7698c6eabd"}, &(0x7f0000000180)=0x61) 08:49:17 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4004510d, &(0x7f0000000140)) ioctl$RTC_WIE_OFF(r0, 0x7010) socket(0x2, 0x8000a, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f00000002c0)={'lo\x00', 0x7}) 08:49:17 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x10001, 0x80000) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x4e22, 0x4, @ipv4={[], [], @local}, 0x5}}, 0x5, 0x200, 0x6, "a7ce02c778b5e84c8b30adb127a0029f76797e0554cb1ea95e4ba2482d9921eae6e300e23d91fc8e800927e0f32dbd484d455f5a435349eb69268488350866178070a5a403c6ff0ca10f5469c3a8e972"}, 0xd8) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) r1 = socket$inet6(0xa, 0x800000005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x804, 0x31, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000005c0), &(0x7f0000000600)=0x8) 08:49:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x8, 0x101000) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000140)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = dup2(r0, r0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f0000000000)={0x6, 0x4, 0x81, 0x6, 0xffff, 0x0, 0x3}) write(r2, &(0x7f0000000100), 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbbf4}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x5}, [@nested={0x8, 0x11, [@generic="e2"]}]}, 0x1c}}, 0x0) 08:49:17 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x4000000800200000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000000, 0x4) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0xffffffffffffffff) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0xc0002, 0x0) sendto$inet6(r2, &(0x7f0000000140)="c556", 0x2, 0x0, &(0x7f00000001c0)={0xa, 0x4e21, 0x1, @empty, 0x5}, 0x1c) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x6, 0x2, 0x4, 0x3b, 0x7, 0x7ca, 0x1ff, {0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x16}}}, 0xbd, 0x4, 0x8000, 0x2, 0x400}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r3, 0x101, 0x5}, 0x8) get_mempolicy(&(0x7f00000000c0), &(0x7f0000000180), 0x8001, &(0x7f0000003000/0x1000)=nil, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet_int(r4, 0x0, 0x31, &(0x7f0000000040)=0x5, 0x4) openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x230000, 0x0) 08:49:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:18 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback, 0x0, 0x1}}, 0xe8) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[]}}, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='bcsf0\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f00000000c0)=@nl, 0x80, &(0x7f0000000200)=[{&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000380)=""/152, 0x98}], 0x2, &(0x7f0000002040)=""/4096, 0x1000}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000004c0)={@remote, @remote, @remote, 0x0, 0x7ff, 0x401, 0x500, 0x9, 0x40000000, r2}) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="021200001100000026bd7000fcdbdf2501001400790000000800120003000000000000003800000046003270b4a69956a98fe40000000000ac1414bb0000000000000000000400000000000000000000000000000000000004000400170000001f0000da000700003f00000000000000030000000000120002000b00050000000100000000000000"], 0x88}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x400000000000117, 0x0) 08:49:18 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect(r0, &(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1e211116, 0x600) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000040)={0x3, 0x3, 0x2, 0x8}, 0x10) 08:49:18 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x2000, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x0, 0x0, 0x20000000000001, 0x0, 0x0}, 0x2c) 08:49:18 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000240)={0xfffffffffffffffd, 0x7ffffffc}) 08:49:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x8001, 0x800) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f00000000c0)=0x2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8927, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir}) close(r3) close(r1) 08:49:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000025000300000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000e0000ffffffff0000000064656c00000004000200000000000000"], 0x34}}, 0x0) r1 = dup(r0) finit_module(r1, &(0x7f0000000140)='\x00', 0x2) socketpair(0x9, 0x80006, 0x9, &(0x7f0000000100)) write$P9_RSTATFS(r1, &(0x7f0000000080)={0x43, 0x9, 0x1, {0x5, 0x5b5, 0x80000001, 0x401, 0x1, 0x400, 0x3, 0x4, 0x4}}, 0x43) 08:49:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f00000000c0), &(0x7f00000001c0)) 08:49:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 304.260355] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:19 executing program 4: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c20fca000000000d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a657534726a2cfd6f5cc2ff9cb8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9b682b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217eb2f", 0xc0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhci\x00', 0x40, 0x0) fstatfs(r1, &(0x7f0000000600)=""/4096) r2 = openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in=@rand_addr, @in=@multicast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="95", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r0}, &(0x7f0000000140)=""/166, 0xa6, &(0x7f0000000340)={&(0x7f00000000c0)={'rmd256-generic\x00'}}) [ 304.450769] netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:19 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x105000, 0xb) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/3, 0x3}], 0x1, 0x0) 08:49:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:19 executing program 4: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000100), 0x100000000000019e, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') write$P9_RREAD(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="af000000750100a40000000555f140efac49e1783f66d974c9ec4d6f5187f790e12fd2cf47fd963f1996a0ef1b7f33db8302cce4325b7aa52db32a0a4e665f914f75612a1b2a7d47dff5aa0472cc3dd4ad4d48a3bcc8556125c9cbb9a4fa1fb9b3641115ff7e5718e40172036ac7d644d17ec93539c72a390f33642960d94a350bd4f9a28397028dfd15f553a82d41e8408c167c58d6225b3a4667ecf0f9160697f12d2202332b7e533c23bacf"], 0xaf) 08:49:19 executing program 0: r0 = memfd_create(&(0x7f00000000c0)='-\x00', 0x2) ioctl$KIOCSOUND(r0, 0x4b2f, 0x40) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="d950", 0x2}], 0x1, &(0x7f0000000100)}, 0x0) io_setup(0x8000001000001ff, &(0x7f0000000380)=0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000007d000)="b3", 0x1}]) 08:49:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080)={0x8, 0x8, 0x7f, 0x2, 0x5, 0x61c, 0x8, 0x4, 0x1, 0x3, 0x7}, 0xb) r1 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) close(r1) 08:49:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:20 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x40000, 0x0) recvmsg$kcm(r0, &(0x7f00000016c0)={&(0x7f0000000100)=@ax25, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000001340)=""/131, 0x83}, {&(0x7f0000001400)=""/99, 0x63}, {&(0x7f0000000280)=""/17, 0x11}, {&(0x7f0000001480)=""/53, 0x35}, {&(0x7f00000014c0)=""/214, 0xd6}, {&(0x7f00000015c0)=""/40, 0x28}], 0x8, &(0x7f0000001680)=""/25, 0x19, 0x2}, 0x21) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@getsa={0x74, 0x12, 0x42f, 0x0, 0x0, {@in6}, [@algo_auth_trunc={0x4c, 0x14, {{'sha384\x00'}}}]}, 0xff5c}}, 0x0) 08:49:20 executing program 4: r0 = socket(0x15, 0x80005, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f00000000c0)={{0x3a, @empty, 0x4e22, 0x1, 'wlc\x00', 0x0, 0x27, 0x73}, {@local, 0x4e20, 0x0, 0x4, 0x800, 0x8}}, 0x44) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xfec0, 0x0, 0x0, 0x0, 0x0, 0x3e], [], @broadcast}}, 0x1c) 08:49:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:20 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x40, 0x2000) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000700)=ANY=[@ANYBLOB="0800000004000000660b000000000000e30e0000000000000000000000000000040000000000000000800000000000000200000000000000000100000000ce8d02320000000000000600000000000000010001000000000001000100000000000000010000000000fbffffff00000000090000000000000067070000000000000900000000000000"]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000006c0)={0x5, 0x9, 0x7ff, 0x0, 0x9}) getresgid(&(0x7f0000000280), 0x0, &(0x7f00000002c0)=0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000680)='nbd\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000009c0)={0x0}, &(0x7f0000000a00)=0xc) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000d80)=0x9, &(0x7f0000000dc0)=0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000b00)=0x0) getresuid(&(0x7f0000000b40), &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)) sendmsg$unix(r0, &(0x7f0000000cc0)={&(0x7f00000007c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000980)=[{&(0x7f0000000840)="0fbe80356dc1f3e7e98375c57d86aa5f0140", 0x12}, {&(0x7f0000000880)="918e4054ae4e9f8cf18f827268e11140daf3af4c788c3f3f24b1f21e089a62ffe0e36b627ff20a1915f61f1199327ac982818af9ae1502b02e68c7b1a5a3fac22df5dec95d30ac07fed63acb2237230c66b268edaa21cd1634dcf04f96dd1b734f47bffa16fbb6ee7e0861edc27886c2122532f56b97ff889a4fa577495fd7c2ea3d8bfe6b272c1ee9e56b43f087c7f66b415dacc61a6c5f2916e1b0c349c49eb6ea34a9dd8a748d76adff6554762d30f3021c2ce1df48dde3c59253d3af3e2f84054769b0d5cfe477306302a2a94f059e248af41d4a22fcf5a1d7dc0f351e6179bc3ead7099e39bfeceeead433589913b", 0xf1}], 0x2, &(0x7f0000000c00)=[@cred={0x20, 0x1, 0x2, r2, r3, r1}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r1}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0xc0, 0x80}, 0x1) sendmsg$unix(r0, &(0x7f0000000640)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000140)="1925645fc54123b92abc831943245ed253ff3b457edfa821fcc1a8f849e0db2be2191d258defb149b43dcb57ed05d070bd6e7a496b120e1ebeb52155930e8c777349ea6e6c9c58bb35694121f3828a74617b71aae0bfbb914f135bcce01e6692de7ee59f29f07ac77a600d515ba650b9e9937e4d0557c610624d36e570debf561473d020100380a7d85635b9a9566c52bd9db87034b7d7300ad7ed11bad984f6776a3dde2a338b4e9d8c6b3a91b58b5c52019d80f058cc6f6c1dd10a3e6a4c1a6f44c41c9c83c0ea32c8157ccfe3b2778bf98a17a1af59fed1d76b1ca73043bdc78315451770cffe703ab180e09b31e2caa45173d462f5db", 0xf8}, {&(0x7f0000000300)="0b2ed4e94c5e3fa43838841c7ebad945eb6d85ace25cc8da218e009b030ba200bcdf95f36fe376c6ec89cfe9b65c573556344320347d51bb2ed4d57db06e0926574721fbc8afb583501f862069def062a1a7c009087c886ce3648ca52a586bac834235d9fb2f", 0x66}, {&(0x7f0000000380)="5ed4fe34ec02fde164b9b79347dd884c1b6a3fa01260a86e1e0564b29124aa26987c2c09151a47396b5a0f1a29d0a2ceddedbcbf244ea227bd1fa3631359051be9d12bd763902338a8c6df071b6cd4262a436100e67d3708fb0afd676020532a543e105e3664a5c34cfd16a353e0530146", 0x71}, {&(0x7f0000000240)="3d9b45c5afce571e1e8de3a0c531e18c84a6808873e10d522a37e619c16a712d1a4dd6b5", 0x24}, {&(0x7f0000000400)="862bda1c0f61996e611c9be287a9f4af481e0836950de34b061bf3745f61e3afa556ac261d2f7e38d7743727670d12c3c3c6d7467c339249ed6fcc96b97f1566a452937fd9cad4db60ef3b2c12abb00bd90d79de46d81c413163149c8c264db8232de1e731248745cfe7db84efa8a1082cfb6be2525007f5fbf694fa46c240e59aac6503163cccb4f3dedeb89674ee7621200b6d1639a79beabe3770db48f7d28363133f0f6a36a9f229667096a9489405df8503e6dba4637bebbf5d04570e59bd86010cfe17a40bdc61f3ce", 0xcc}, {&(0x7f0000000500)="c4e7fbde6d59821b4e73ab6c4a16a10b532b1624006404c7373f7b7254ef1b1c2114bcd7fe17579d61ec6372b73a61f8d884bd6715104c4db90fb98687676b79b11f87c85b0d672e08db7f", 0x4b}, {&(0x7f0000000580)="f1f60f1e8ce225d218cecd7ecf316f4342135b3b9fe1c4c7cc897d09aee054cf98", 0x21}], 0x7, 0x0, 0x0, 0x20000080}, 0x4) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000d00)="50cdb52844d9951e8d80c0d3956a6235336934dcb731523075474b2e64be530087f02781260228fbcfa6ba45770596b7997510447141472732f5594793340dc2bd055897beea730474166a40ad92405a88df636c75fc1286acb07ec69e676613b1d362a9669c7c4a269b48110ffb99954324f9fc297dc7") 08:49:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x0, @local}], 0x10) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x1, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x400, 0x1) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat$nullb(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000100)=0x2000) [ 305.470801] netlink: 84 bytes leftover after parsing attributes in process `syz-executor2'. 08:49:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:20 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x8001000000002c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x404080, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0xbf7, 0x1) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0xffffffffffffffff, 0x6, {0x100000000}}, 0x18) 08:49:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x77, 0x0, [0x4b564d00], [0x0, 0x2]}) r3 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0x8000, 0xaf95814798be8764) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000340)=0x3, 0x4) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="0f06660f3a4173b90cb8c4000f00d866b93808000066b80000000066ba000000000f30660f3a6104940f20d7b874000f00d866b9a60100000f32600f32", 0x3d}], 0x1, 0x28, &(0x7f00000000c0), 0x0) 08:49:20 executing program 5: socketpair(0x4, 0x80a, 0x29f, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x5452, 0x7fffff) memfd_create(&(0x7f0000000000)='md5sum-\x00', 0x3) 08:49:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:21 executing program 4: r0 = accept$inet(0xffffffffffffff9c, &(0x7f00000029c0), &(0x7f0000002a00)=0x10) close(r0) io_setup(0x7fffffff, &(0x7f00000000c0)=0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x100, 0x0) r3 = dup(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/netfilter\x00') io_submit(r1, 0x5, &(0x7f0000001540)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x9, r0, &(0x7f0000000100)="7e28265be8534fb65658477b48e252bbe04941872e3cf6b4e22dcd5a6693c46f5c14fada0c5591c1e39a971fa8fd7961a36a31462cdda0571f90634feea8b2c97c349dea5b1a26f3f99d7150e348280d908ce1a083", 0x55, 0x3f, 0x0, 0x2, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000200)="2d81dd989a42c45e895629e28a83ba68217b5dc790bc683dd72f57fb72af9a0859c122238547ed78a4c345d5bce32edb0cdc74b59d633cf847214d71849aae72dfe5a87e693b47b8b55a955e595ec86acecf39949339aaea89de7fa61ee7d2c346bbc755c47a0aa07c5681448da72da771b9005aeb3e79cfdac0c2ffe6370a45e475e2f4743a9832d3b3ae0722a18d150c06576c85d6a68308b324aed14fd313c4ea97b199482bf37b21d52b999cbd45caa4186c61901a201384faf3d949c92fb33fc8630de36ca9f52168047a53a74086", 0xd1, 0x7, 0x0, 0x0, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x7, r0, &(0x7f0000000340)="802aa8fbb6a7b11a915b0623f76e4abad56fac34894ed2ef60b1048e7ec3240c61405f6e2f7712d9fa34e85d1660438c135d128333625bd8609e78d81f2c7ed54ed160d12d40779e68adcbadc46c174d650eeea68574d15b8f2d1c399a9bdd88c87603b7fef5587316ea0703e946f239463156465f5de1f65a0eaacd2d74410f386bc4135b1832d06786c0c3ef103f98df9edf776eed", 0x96, 0xbbb, 0x0, 0x3, r4}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0xa, 0x4a8, r0, &(0x7f0000000480)="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", 0x1000, 0x1, 0x0, 0x60e3909b346a3255, r0}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000014c0)="34c3137156f4cfc934e523ccbd804523cc69b22bde8fe4cf9581ebc16a28c8bf7964d924e217b07c5f73774972cb44b4", 0x30, 0x3, 0x0, 0x1, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000002a40), 0x4) pwritev(r4, &(0x7f0000002640)=[{&(0x7f0000001580)="854f97dd895e4d24ba35e52fa18207c20297c4539cce59d6136ea4f2770af02b7c7b3cbf8e862c80a3cbcef2b9787aa6f1be269cd40e74c81e7604a699eff8a819fa54976e5972a7a746d012a1979d6ec5cbc7c44091eddae1fb6ac3c421183df6f5670c12a08b2af70f745cf9e56cc33eb5ea559b099a235be10918d800125b64597975abd858fe3de94be367d78eb6e0a2d565b773506fbd9b85d6e90152eda50d8981", 0xa4}, {&(0x7f0000001640)="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", 0x1000}], 0x2, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x22002) write$P9_RREAD(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="a301447d868e8d9a41fa6d182c206a4300"], 0x1) ioctl$int_in(r5, 0x800000c0045004, &(0x7f0000000000)) 08:49:21 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x7, 0x481, [], &(0x7f0000000040)={0x0, 0xe6f, [], @value64=0x7}}) syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x6289, 0x0) 08:49:21 executing program 2: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) 08:49:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x0, @local}], 0x10) sendto$inet(r0, &(0x7f00000000c0)="cf", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x1, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x400, 0x1) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) openat$nullb(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nullb0\x00', 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r3, 0x4008ae48, &(0x7f0000000100)=0x2000) 08:49:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000280)={@mcast1, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000300)={r1, 0x1, 0x6, @dev={[], 0x12}}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001fc0)={'veth0_to_bond\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r2, 0x1, 0x0, @broadcast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x60000, 0x0) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f00000000c0)={0x2, 0x1, 0x5, [], &(0x7f0000000040)=0xffff}) close(r0) 08:49:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e24, 0x6, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x1000, @empty, 0x8}, @in={0x2, 0x4e24}], 0x58) [ 306.925360] device veth0_to_bond entered promiscuous mode [ 306.967617] device veth0_to_bond left promiscuous mode 08:49:22 executing program 2: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') read$eventfd(r0, &(0x7f00000001c0), 0x8) lseek(r0, 0x0, 0x1000002) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x282, 0x0) dup2(r1, r1) 08:49:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 307.059708] device veth0_to_bond entered promiscuous mode [ 307.097030] device veth0_to_bond left promiscuous mode 08:49:22 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r0}, {r0, 0x10000000000000}, {r0, 0x3fff}, {r0, 0x4}], 0x4, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000100)={0x8}, 0x8) pselect6(0x381, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300)={0x0, 0x0, 0x0, 0x800000000000}, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 08:49:22 executing program 4: r0 = accept$inet(0xffffffffffffff9c, &(0x7f00000029c0), &(0x7f0000002a00)=0x10) close(r0) io_setup(0x7fffffff, &(0x7f00000000c0)=0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x100, 0x0) r3 = dup(r0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)='net/netfilter\x00') io_submit(r1, 0x5, &(0x7f0000001540)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x9, r0, &(0x7f0000000100)="7e28265be8534fb65658477b48e252bbe04941872e3cf6b4e22dcd5a6693c46f5c14fada0c5591c1e39a971fa8fd7961a36a31462cdda0571f90634feea8b2c97c349dea5b1a26f3f99d7150e348280d908ce1a083", 0x55, 0x3f, 0x0, 0x2, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000200)="2d81dd989a42c45e895629e28a83ba68217b5dc790bc683dd72f57fb72af9a0859c122238547ed78a4c345d5bce32edb0cdc74b59d633cf847214d71849aae72dfe5a87e693b47b8b55a955e595ec86acecf39949339aaea89de7fa61ee7d2c346bbc755c47a0aa07c5681448da72da771b9005aeb3e79cfdac0c2ffe6370a45e475e2f4743a9832d3b3ae0722a18d150c06576c85d6a68308b324aed14fd313c4ea97b199482bf37b21d52b999cbd45caa4186c61901a201384faf3d949c92fb33fc8630de36ca9f52168047a53a74086", 0xd1, 0x7, 0x0, 0x0, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x7, r0, &(0x7f0000000340)="802aa8fbb6a7b11a915b0623f76e4abad56fac34894ed2ef60b1048e7ec3240c61405f6e2f7712d9fa34e85d1660438c135d128333625bd8609e78d81f2c7ed54ed160d12d40779e68adcbadc46c174d650eeea68574d15b8f2d1c399a9bdd88c87603b7fef5587316ea0703e946f239463156465f5de1f65a0eaacd2d74410f386bc4135b1832d06786c0c3ef103f98df9edf776eed", 0x96, 0xbbb, 0x0, 0x3, r4}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0xa, 0x4a8, r0, &(0x7f0000000480)="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", 0x1000, 0x1, 0x0, 0x60e3909b346a3255, r0}, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000014c0)="34c3137156f4cfc934e523ccbd804523cc69b22bde8fe4cf9581ebc16a28c8bf7964d924e217b07c5f73774972cb44b4", 0x30, 0x3, 0x0, 0x1, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000002a40), 0x4) pwritev(r4, &(0x7f0000002640)=[{&(0x7f0000001580)="854f97dd895e4d24ba35e52fa18207c20297c4539cce59d6136ea4f2770af02b7c7b3cbf8e862c80a3cbcef2b9787aa6f1be269cd40e74c81e7604a699eff8a819fa54976e5972a7a746d012a1979d6ec5cbc7c44091eddae1fb6ac3c421183df6f5670c12a08b2af70f745cf9e56cc33eb5ea559b099a235be10918d800125b64597975abd858fe3de94be367d78eb6e0a2d565b773506fbd9b85d6e90152eda50d8981", 0xa4}, {&(0x7f0000001640)="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", 0x1000}], 0x2, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x22002) write$P9_RREAD(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="a301447d868e8d9a41fa6d182c206a4300"], 0x1) ioctl$int_in(r5, 0x800000c0045004, &(0x7f0000000000)) 08:49:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffdb, 0x0, 0x0, 0x0, 0x0, 0xffffff85, 0xa0ffffff00000000, 0xff00}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x21) 08:49:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x19) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) 08:49:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d0240316285717070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r1, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x3, 0x64031, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000edffc8)={0x0, 0x0, &(0x7f0000ef8fd0), 0x0, &(0x7f0000603000)=""/81, 0x51}, 0x40002102) 08:49:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000000)="a899c924ef79f61e384990610decf7166ae8d4c4568900f24c6a0bc9660103e87e003e2e8e2eaa8ca7de7b1a8d2ac0065903547921ffd217497bf9b8711786108f9896c27dad7ef5b47882cd32300c01afce06e992f75264c0da620b4d9b4ee60359c5393f8ee97f218111ea31cb05b62c6e593bfdf9457ef922820548ee727899e24de5255b1e8c571c8837dee1a109d461df9223") umount2(&(0x7f0000000180)='./file0\x00', 0x0) 08:49:23 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x7) 08:49:23 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000200)={{0xffffff92}, {0xffffffd0}}) 08:49:23 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000fe5fee)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)) 08:49:23 executing program 2: add_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000000c0)={0x8, 0x40, 0x0, 0x7}, 0xffffffffffffffd8) 08:49:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='projid_map\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/169, 0xa9}], 0x1, 0x0) 08:49:23 executing program 4: setpriority(0x0, 0x0, 0x1) 08:49:24 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc00c9207, 0x200096c3) 08:49:24 executing program 5: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) 08:49:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x3, 'veth1_to_team\x00', 0x80000000000008}, 0x18) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002a80)={&(0x7f0000000080)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f00000027c0), 0x0, &(0x7f00000029c0)}, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'ip6tnl0\x00'}, 0x18) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='veth1_to_team\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r1, r2) 08:49:24 executing program 3: mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:24 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000200)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2500, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x10, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x1, r2, 0x0, 0xffffffffffffff9c}, 0x10) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)={0x3}) write$P9_RREMOVE(r3, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300)}, 0xa0) fsetxattr(r0, &(0x7f0000000440)=@known='security.apparmor\x00', &(0x7f0000000480)="2e2f6367726f75702e6370752f73797a310f", 0x12, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)="2e2f6367726f75d9b6a30000008000000000", 0x1ff) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vhost-vsock\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000980)={0x1, 0x101000000101}) fstat(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) io_setup(0x0, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6370752f2f2e7a310f", 0x1ff) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000400)={0x3, r0}) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r7) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000005c0)={"6e617400000000001000"}, &(0x7f0000000580)=0x78) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000240)) 08:49:24 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)="6370757365742e6d656d6f72795f7073757265004b31a27fd47ddd64f449f9c31c9f052e94dbb9ab800ba66105f4acaa63078565257a779bb7935de4068f1c1bf0a3c1a0", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x3) r2 = dup(0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000780)="f068cdca171d15461d93683a8a3818a00e807ea5a8b0a4a486c6a0c79fac1581dcecb9e57fe03b62e2c073f1440deb1d2bb38b01d827c9047e4b98a6f9c1f2bbbc486c93bc60d46752872a22a605a35070477068497070986923de5d3a5a03d04ce8f1fc8f94a1a007e4a36c4c65dbee14fa4f960c8e95907c39459374e7c5bb3bc1c68f4dfabfc8d0e89a040f3ea0196b13b5c7b37e10f4895159b257fbb7fd1259880f629f7bc0983d8138ca0fcc0f3ca2131c8d960e5569b122c568e0e3fd20d0e1b7a6d8ae195e60a1247f3fd77824e29519fc2925be7af673192a3eb3c2fc57402f6d009983adf2", 0xea}], 0x1, 0x0) setpriority(0x3, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000280)={r2, 0x0, 0x4}) finit_module(r2, &(0x7f0000000140)='security.evm\x00', 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) capget(&(0x7f0000000180)={0x20080522}, &(0x7f0000000240)={0x6, 0x1000, 0x101, 0x2, 0x1, 0x6}) sendto$inet(r3, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r3, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) poll(&(0x7f0000000200)=[{r2}, {}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x80}, {}], 0x5, 0x3) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000600)={0x9, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @rand_addr=0xfffffffffffffff7}}}, 0x108) read(r3, &(0x7f0000000380)=""/172, 0xffffff88) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=ANY=[], 0x0, 0x0) 08:49:24 executing program 2: ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f00000001c0)) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000100)=0x8000, 0x4) connect(r0, &(0x7f0000000180)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x80) [ 309.677394] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 309.753139] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. [ 309.806133] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:25 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x80805513, 0x70f000}) [ 310.181647] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:25 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={"0000000000000000000000000200", 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) write$P9_RXATTRCREATE(r3, &(0x7f0000000140)={0x383}, 0x7) write$P9_RSETATTR(r3, &(0x7f0000000040)={0x7}, 0x7) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) sendfile(r0, r3, &(0x7f0000d83ff8), 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) 08:49:25 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r0, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 310.616714] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 310.623694] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:49:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43, 0x9, 0x0, {0x0, 0x3, 0x1f, 0x4, 0x0, 0x0, 0x0, 0x100}}, 0x43) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @remote}, &(0x7f0000000300)=0xc) renameat(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000280)='./file0\x00') [ 310.670665] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:25 executing program 5: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)="6370757365742e6d656d6f72795f7073757265004b31a27fd47ddd64f449f9c31c9f052e94dbb9ab800ba66105f4acaa63078565257a779bb7935de4068f1c1bf0a3c1a0", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x3) r2 = dup(0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000780)="f068cdca171d15461d93683a8a3818a00e807ea5a8b0a4a486c6a0c79fac1581dcecb9e57fe03b62e2c073f1440deb1d2bb38b01d827c9047e4b98a6f9c1f2bbbc486c93bc60d46752872a22a605a35070477068497070986923de5d3a5a03d04ce8f1fc8f94a1a007e4a36c4c65dbee14fa4f960c8e95907c39459374e7c5bb3bc1c68f4dfabfc8d0e89a040f3ea0196b13b5c7b37e10f4895159b257fbb7fd1259880f629f7bc0983d8138ca0fcc0f3ca2131c8d960e5569b122c568e0e3fd20d0e1b7a6d8ae195e60a1247f3fd77824e29519fc2925be7af673192a3eb3c2fc57402f6d009983adf2", 0xea}], 0x1, 0x0) setpriority(0x3, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000280)={r2, 0x0, 0x4}) finit_module(r2, &(0x7f0000000140)='security.evm\x00', 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) capget(&(0x7f0000000180)={0x20080522}, &(0x7f0000000240)={0x6, 0x1000, 0x101, 0x2, 0x1, 0x6}) sendto$inet(r3, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r3, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) poll(&(0x7f0000000200)=[{r2}, {}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x80}, {}], 0x5, 0x3) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000600)={0x9, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @rand_addr=0xfffffffffffffff7}}}, 0x108) read(r3, &(0x7f0000000380)=""/172, 0xffffff88) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=ANY=[], 0x0, 0x0) 08:49:26 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 310.958054] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 08:49:26 executing program 1: mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:26 executing program 2: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f0000000540)="6370757365742e6d656d6f72795f7073757265004b31a27fd47ddd64f449f9c31c9f052e94dbb9ab800ba66105f4acaa63078565257a779bb7935de4068f1c1bf0a3c1a0", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x3) r2 = dup(0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000780)="f068cdca171d15461d93683a8a3818a00e807ea5a8b0a4a486c6a0c79fac1581dcecb9e57fe03b62e2c073f1440deb1d2bb38b01d827c9047e4b98a6f9c1f2bbbc486c93bc60d46752872a22a605a35070477068497070986923de5d3a5a03d04ce8f1fc8f94a1a007e4a36c4c65dbee14fa4f960c8e95907c39459374e7c5bb3bc1c68f4dfabfc8d0e89a040f3ea0196b13b5c7b37e10f4895159b257fbb7fd1259880f629f7bc0983d8138ca0fcc0f3ca2131c8d960e5569b122c568e0e3fd20d0e1b7a6d8ae195e60a1247f3fd77824e29519fc2925be7af673192a3eb3c2fc57402f6d009983adf2", 0xea}], 0x1, 0x0) setpriority(0x3, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000280)={r2, 0x0, 0x4}) finit_module(r2, &(0x7f0000000140)='security.evm\x00', 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) capget(&(0x7f0000000180)={0x20080522}, &(0x7f0000000240)={0x6, 0x1000, 0x101, 0x2, 0x1, 0x6}) sendto$inet(r3, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2]}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r3, &(0x7f0000f9cf9b)=""/101, 0xffffff24, 0x122, 0x0, 0x4f) poll(&(0x7f0000000200)=[{r2}, {}, {0xffffffffffffffff, 0x1}, {0xffffffffffffffff, 0x80}, {}], 0x5, 0x3) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000600)={0x9, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @rand_addr=0xfffffffffffffff7}}}, 0x108) read(r3, &(0x7f0000000380)=""/172, 0xffffff88) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=ANY=[], 0x0, 0x0) [ 311.539791] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:49:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:26 executing program 5: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) getrandom(&(0x7f0000000240)=""/182, 0xb6, 0x2) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x1000000000014) 08:49:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:27 executing program 1: mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 312.823342] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000640)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x49, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000600)}, 0x0, 0x0, 0x0, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x3, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x41}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0xdc, &(0x7f0000000280)="0494c16d15656fc30b46585fde1e", &(0x7f0000000380)=""/220, 0xf000}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0x5, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f0000000740)='syzkaller\x00', 0x0, 0xd2, &(0x7f0000000880)=""/210, 0x41100}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") 08:49:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={@dev}) 08:49:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000026c0), 0x38b, 0x0) 08:49:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:28 executing program 1: mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 313.778467] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x19) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000000004, 0x400031, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000140), 0x1, 0x0) 08:49:29 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(r1, 0x2008200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)=@known='trusted.syz\x00', &(0x7f0000000100)=""/138, 0x8a) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x401}) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) fallocate(r3, 0x8, 0x0, 0x10000) sync() [ 314.017573] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:29 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) 08:49:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1500000000000000]}}]}, 0x2c}}, 0x0) [ 314.447169] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:29 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/187, 0xbb) clone(0x3ff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc00c9207, 0x200096c3) 08:49:29 executing program 4: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)='syz', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x8, 0x40, 0x52f15404, 0x7}, 0xffffffffffffffd8) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) stat(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) rmdir(&(0x7f0000000500)='./file0\x00') ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) lchown(&(0x7f0000000140)='./file0\x00', r1, r2) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') lchown(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) fchdir(r4) getdents64(r4, &(0x7f0000000200)=""/116, 0x184) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)={0x6, 0x6, 0x6}) write$binfmt_aout(r3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], 0x9b6) ftruncate(0xffffffffffffffff, 0xff) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f00000000c0)) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000006c0)) 08:49:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1500000000000000]}}]}, 0x2c}}, 0x0) [ 314.942014] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:30 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1, 0x0, 0x0, 0x0, 0x6}}) [ 315.269753] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:30 executing program 2: r0 = shmget$private(0x0, 0xb000, 0x0, &(0x7f0000ff5000/0xb000)=nil) mlockall(0x2) shmat(r0, &(0x7f0000ff7000/0x2000)=nil, 0x6000) 08:49:30 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000080)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0xd}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000018, 0x0) 08:49:30 executing program 4: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x800094, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0x0) write$P9_RSTATFS(r0, &(0x7f0000000500)={0x43}, 0x43) 08:49:30 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0105512, &(0x7f00000001c0)={0x0, 0x5517}) [ 315.690905] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x23, 0x4, 0x1, 0x0, r1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f0000000040)}, 0x10) 08:49:31 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 08:49:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 08:49:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000040)={'ip6tnl0\x00', @ifru_ivalue}) 08:49:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@ipv6_newaddr={0x2c, 0x14, 0x509, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @local}]}, 0x2c}}, 0x0) 08:49:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:32 executing program 4: r0 = socket$inet6(0xa, 0x1202000000000002, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x7ff, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)) 08:49:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f00000004c0)=0xc) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x2, 0x0, [0x268]}) 08:49:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x4, 0x0, 0x800000000, 0x0, 0x10}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000000c0)=""/135, &(0x7f0000000180)=0x1e) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x6, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x88, 0x4) ioctl(r1, 0x0, &(0x7f0000000240)="153f6234488dd25d766070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x2013, r2, 0x8000) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) close(0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0xad, {{0x2, 0x4e21}}}, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r2, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r4, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000002c0)={@mcast1, 0x1, 0x2, 0x2, 0xb, 0x6, 0xc8, 0x3}, 0x20) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x3c000, 0x800}, 0x18) write$binfmt_elf32(r5, &(0x7f0000000900)=ANY=[], 0x0) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000640), 0x4) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000440)=@req3={0x7, 0x6, 0x0, 0xc1, 0x3e4000}, 0xffffffffffffff0e) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000000c0)={0x8, 0x81, 0x9, 0x7, 0x2}) socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000340)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000017c0)={{{@in6, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000018c0)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000000580)=0x132) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000500)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000019c0)={{{@in6=@loopback, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001ac0)=0xe8) 08:49:32 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 317.425733] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(0xffffffffffffffff, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:32 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x0, 0x1c9c380}, 0x8) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) 08:49:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:32 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x7, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 317.909490] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000140)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002e00)={&(0x7f0000000640)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(wp384-generic,ctr(serpent))\x00'}, 0x80, &(0x7f0000002b40)=[{&(0x7f00000008c0)}], 0x1, &(0x7f0000002bc0)=[{0x10}], 0x10}, 0x0) 08:49:33 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 318.297697] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0x3, 0xc003, 0x61, 0x14, 0xffffffffffffff9c}, 0x2c) 08:49:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:33 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001c80)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 08:49:33 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 318.553954] atomic_op 000000006bcda95a conn xmit_atomic (null) [ 318.569204] atomic_op 000000006bcda95a conn xmit_atomic (null) [ 318.654066] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:33 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000943ffc)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000), 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x4) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x1f6) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) 08:49:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:33 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001c80)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0), 0x0, &(0x7f0000000100)=[@cswp={0x58, 0x114, 0x8, {{}, &(0x7f0000000040), &(0x7f0000000080)}}], 0x58}, 0x0) 08:49:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:34 executing program 3: [ 319.039085] atomic_op 000000001a3bcc6e conn xmit_atomic (null) [ 319.091311] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:34 executing program 3: 08:49:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:34 executing program 2: 08:49:34 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:34 executing program 3: 08:49:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:34 executing program 4: 08:49:34 executing program 2: 08:49:35 executing program 3: 08:49:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:35 executing program 4: 08:49:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040), &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x0, 0xfffffffffffffffd}, 0x48) [ 320.250641] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:35 executing program 2: 08:49:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:35 executing program 4: 08:49:35 executing program 3: 08:49:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040), &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x0, 0xfffffffffffffffd}, 0x48) 08:49:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:35 executing program 2: [ 320.782750] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:35 executing program 3: 08:49:36 executing program 4: 08:49:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000040), &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x0, 0xfffffffffffffffd}, 0x48) 08:49:36 executing program 2: 08:49:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:36 executing program 3: [ 321.319623] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:36 executing program 4: 08:49:36 executing program 3: 08:49:36 executing program 2: 08:49:36 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:36 executing program 4: [ 321.867965] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:37 executing program 3: 08:49:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:37 executing program 2: 08:49:37 executing program 4: 08:49:37 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:37 executing program 3: 08:49:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:37 executing program 4: 08:49:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:37 executing program 3: [ 322.630633] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:37 executing program 2: 08:49:38 executing program 4: 08:49:38 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:38 executing program 3: 08:49:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:38 executing program 2: [ 323.235108] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:38 executing program 5: 08:49:38 executing program 3: 08:49:38 executing program 4: r0 = eventfd(0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000040), 0x8) r1 = socket$inet6(0xa, 0x1, 0x0) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000700)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x1, r0}]) 08:49:38 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$netlink(0x10, 0x3, 0x4000000000010) timer_create(0x0, &(0x7f0000000040)={0x0, 0x3, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000000c0)=0x0) timer_delete(r1) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socket(0x0, 0x7, 0x0) munmap(&(0x7f0000feb000/0x1000)=nil, 0x1000) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000500)={0x2, 0x0, @ioapic={0x5002, 0x0, 0x8, 0x90, 0x0, [{0x8, 0x7fff, 0x0, [], 0x3142}, {0x7f, 0x0, 0x7, [], 0x71b9f53c}, {0x2, 0x7, 0x101, [], 0x8}, {0x7, 0x7, 0x10001, [], 0xfffffffffffffffd}, {0xfffffffffffffffc, 0x3, 0x7ff, [], 0x1}, {0x1f, 0x1, 0x6}, {0x4, 0xffffffffffffffff, 0x0, [], 0x91}, {0xfffffffffffffff9, 0x8001, 0xfebc}, {0x1, 0xffff, 0x0, [], 0x3}, {0x0, 0xfff, 0x81, [], 0x2}, {0xffffffffffff044b, 0x400, 0xffff, [], 0x73}, {0x0, 0x0, 0x1, [], 0x4}, {0x10000, 0xbc, 0x1, [], 0x8001}, {0x7, 0x9, 0x7, [], 0x6}, {0x3, 0x0, 0x4, [], 0x7ff}, {0x0, 0x0, 0x7, [], 0x6}, {0x6, 0x8, 0x3, [], 0xff}, {0x0, 0x2, 0x3f, [], 0x5}, {0x0, 0x9, 0x2, [], 0x4}, {0x100, 0x6, 0xfffffffffffffffe, [], 0x401}, {0x3, 0x81, 0x0, [], 0x7}, {0x7fffffff, 0xf93, 0x40, [], 0x74c}, {0xfff, 0x5, 0x20000, [], 0x5}, {0x800000, 0x0, 0x5, [], 0x401}]}}) accept4(0xffffffffffffffff, &(0x7f0000000140)=@sco, &(0x7f00000004c0)=0xffffffffffffffec, 0x80000) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x800) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) semget(0x2, 0x2, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600", 0x3f}], 0x1) 08:49:38 executing program 5: syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x80000000005, 0x4001) 08:49:38 executing program 3: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x36, &(0x7f0000000280)="d729503773c77e2b8be579b71f919d60e06c6e89f02500ea808b181118", 0x1d) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@profile={'changeprofile ', ':]proc(\x00'}, 0xf) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1e, &(0x7f00000002c0), 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000d06000), 0x4) epoll_wait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x80) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0)={0x1}, 0x122) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000100)={0x5, 0x3f, 0xec0}) 08:49:38 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, 0xfffffffffffffffe, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000180)) io_destroy(r2) [ 324.177201] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. 08:49:39 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:39 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:39 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 324.430963] netlink: 59 bytes leftover after parsing attributes in process `syz-executor0'. [ 324.524379] netlink: 59 bytes leftover after parsing attributes in process `syz-executor4'. 08:49:39 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 324.770149] netlink: 59 bytes leftover after parsing attributes in process `syz-executor5'. 08:49:39 executing program 4 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000000040)=@framed={{}, [@alu]}, &(0x7f0000f6bffb)='GPL\x00', 0x4, 0x83, 0xfffffffffffffffd}, 0x48) 08:49:40 executing program 2 (fault-call:7 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r2, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x1}, [{}]}, 0x58) read(r1, &(0x7f0000000000)=""/126, 0xfffffd6d) 08:49:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) 08:49:40 executing program 5: socket(0x0, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100000, &(0x7f0000000180), &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000000c0)) [ 325.118359] FAULT_INJECTION: forcing a failure. [ 325.118359] name failslab, interval 1, probability 0, space 0, times 1 [ 325.129854] CPU: 1 PID: 9460 Comm: syz-executor4 Not tainted 4.19.0+ #80 [ 325.136753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.146163] Call Trace: [ 325.148797] ================================================================== [ 325.156192] BUG: KMSAN: uninit-value in get_stack_info+0x720/0x9d0 [ 325.162530] CPU: 1 PID: 9460 Comm: syz-executor4 Not tainted 4.19.0+ #80 [ 325.169376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.178744] Call Trace: [ 325.181368] dump_stack+0x419/0x480 [ 325.185016] ? _raw_spin_lock_irqsave+0x237/0x340 [ 325.189881] ? get_stack_info+0x720/0x9d0 [ 325.194057] kmsan_report+0x19f/0x300 [ 325.197897] __msan_warning+0x76/0xd0 [ 325.201730] get_stack_info+0x720/0x9d0 [ 325.205738] __unwind_start+0x7d/0xe0 [ 325.209556] show_trace_log_lvl+0x20e/0x11e0 [ 325.213988] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 325.219397] show_stack+0x12e/0x170 [ 325.223054] dump_stack+0x32d/0x480 [ 325.226714] should_fail+0x11e5/0x13c0 [ 325.230626] __should_failslab+0x278/0x2a0 [ 325.234886] should_failslab+0x29/0x70 [ 325.238790] __kmalloc_node+0x257/0x1520 [ 325.242884] ? __msan_poison_alloca+0x1e0/0x2b0 [ 325.247574] ? __get_vm_area_node+0x28c/0x820 [ 325.252094] ? kmsan_set_origin+0x83/0x130 [ 325.256364] __get_vm_area_node+0x28c/0x820 [ 325.260723] __vmalloc_node_range+0x290/0x12a0 [ 325.265321] ? bpf_prog_alloc+0xe1/0x4f0 [ 325.269425] __vmalloc+0xe2/0x100 [ 325.272896] ? bpf_prog_alloc+0xe1/0x4f0 [ 325.276979] bpf_prog_alloc+0xe1/0x4f0 [ 325.280880] ? strcmp+0x83/0x160 [ 325.284265] __do_sys_bpf+0x6584/0xf9a0 [ 325.288267] ? kmsan_set_origin+0x83/0x130 [ 325.292529] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 325.297919] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 325.303390] ? prepare_exit_to_usermode+0x182/0x4d0 [ 325.308415] ? 0xffffffff81000000 [ 325.311891] ? syscall_return_slowpath+0x123/0x8c0 [ 325.316857] __se_sys_bpf+0x8e/0xa0 [ 325.320503] __x64_sys_bpf+0x4a/0x70 [ 325.324232] do_syscall_64+0xcf/0x110 [ 325.328050] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.333244] RIP: 0033:0x457569 [ 325.336452] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.355376] RSP: 002b:00007f364316fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 325.363109] RAX: ffffffffffffffda RBX: 00007f364316fc90 RCX: 0000000000457569 [ 325.370397] RDX: 0000000000000048 RSI: 0000000020b7a000 RDI: 0000000000000005 [ 325.377686] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 325.384976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f36431706d4 [ 325.392254] R13: 00000000004bd97c R14: 00000000004cc5a8 R15: 0000000000000003 [ 325.399543] [ 325.401181] Local variable description: ----state@show_trace_log_lvl [ 325.407674] Variable was created at: [ 325.411411] show_trace_log_lvl+0xb3/0x11e0 [ 325.415744] show_stack+0x12e/0x170 [ 325.419377] ================================================================== [ 325.426736] Disabling lock debugging due to kernel taint [ 325.432194] Kernel panic - not syncing: panic_on_warn set ... [ 325.432194] [ 325.439577] CPU: 1 PID: 9460 Comm: syz-executor4 Tainted: G B 4.19.0+ #80 [ 325.447814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.457190] Call Trace: [ 325.459790] dump_stack+0x419/0x480 [ 325.463438] panic+0x57e/0xb28 08:49:40 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 325.466676] kmsan_report+0x300/0x300 [ 325.470505] __msan_warning+0x76/0xd0 [ 325.474325] get_stack_info+0x720/0x9d0 [ 325.478330] __unwind_start+0x7d/0xe0 [ 325.482157] show_trace_log_lvl+0x20e/0x11e0 [ 325.486588] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 325.491997] show_stack+0x12e/0x170 [ 325.495643] dump_stack+0x32d/0x480 [ 325.499295] should_fail+0x11e5/0x13c0 [ 325.503210] __should_failslab+0x278/0x2a0 [ 325.507467] should_failslab+0x29/0x70 [ 325.511375] __kmalloc_node+0x257/0x1520 [ 325.515452] ? __msan_poison_alloca+0x1e0/0x2b0 [ 325.520133] ? __get_vm_area_node+0x28c/0x820 [ 325.524643] ? kmsan_set_origin+0x83/0x130 [ 325.528906] __get_vm_area_node+0x28c/0x820 [ 325.533258] __vmalloc_node_range+0x290/0x12a0 [ 325.537859] ? bpf_prog_alloc+0xe1/0x4f0 [ 325.541953] __vmalloc+0xe2/0x100 [ 325.545416] ? bpf_prog_alloc+0xe1/0x4f0 [ 325.549498] bpf_prog_alloc+0xe1/0x4f0 [ 325.553403] ? strcmp+0x83/0x160 [ 325.556791] __do_sys_bpf+0x6584/0xf9a0 [ 325.560801] ? kmsan_set_origin+0x83/0x130 [ 325.565076] ? kmsan_internal_unpoison_shadow+0x83/0xe0 08:49:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f0000000280)={'syz'}, 0xfffffffffffffffe, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x57, 0x0, 0x1c, {0x3}, {}, @ramp}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff12}}, 0x0) [ 325.570464] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 325.575931] ? prepare_exit_to_usermode+0x182/0x4d0 [ 325.580954] ? 0xffffffff81000000 [ 325.584420] ? syscall_return_slowpath+0x123/0x8c0 [ 325.589392] __se_sys_bpf+0x8e/0xa0 [ 325.593052] __x64_sys_bpf+0x4a/0x70 [ 325.596781] do_syscall_64+0xcf/0x110 [ 325.600598] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.605800] RIP: 0033:0x457569 08:49:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$sndseq(r3, &(0x7f0000011fd2), 0xffffffee) write$binfmt_elf32(r3, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) read(r2, &(0x7f0000000000)=""/126, 0xfffffd6d) [ 325.609013] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.627932] RSP: 002b:00007f364316fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 325.635661] RAX: ffffffffffffffda RBX: 00007f364316fc90 RCX: 0000000000457569 [ 325.642942] RDX: 0000000000000048 RSI: 0000000020b7a000 RDI: 0000000000000005 [ 325.650228] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 325.657513] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f36431706d4 [ 325.664794] R13: 00000000004bd97c R14: 00000000004cc5a8 R15: 0000000000000003 [ 325.673234] Kernel Offset: disabled [ 325.676868] Rebooting in 86400 seconds..