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", 0xe94}], 0x2, &(0x7f0000001180)}, 0x0) 02:57:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x6, 0x0, 0x0) 02:57:09 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x223, 0x0, 0x0) 02:57:10 executing program 0: 02:57:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002b00050ad25a80648c6356c10324fc00100000000a000000053582c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0) [ 721.107122][T24298] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. [ 721.120593][T24299] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 02:57:10 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 02:57:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x4000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x6}, 0x3c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0xfffffffffffffffc) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x0, 0x67, &(0x7f0000000300)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r4, &(0x7f0000000500)=r5, 0x12) gettid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x8, 0x1, 0x9, 0x10, r4, 0x0, [], 0x0, r4, 0x0, 0x2}, 0x3c) write$cgroup_pid(r4, &(0x7f0000000100), 0xda4fff08) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x4000000000000) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r4, 0x1, r3, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x1, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r6) 02:57:10 executing program 2: 02:57:10 executing program 0: [ 721.504497][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.512238][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.519814][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.527565][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.535237][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.542961][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.550635][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.558313][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.566331][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.573970][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 721.581573][T12390] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 02:57:10 executing program 4: gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) 02:57:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0xd4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x4, 0x4, 0x100001001, 0xd, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x3c) 02:57:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x4, 0x4, 0x100001001, 0xd, r0, 0x0, [], 0x0, 0xffffffffffffffff, 0x2}, 0x3c) 02:57:10 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000640)='./file1\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x841, 0x0) [ 721.716892][T12390] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 02:57:10 executing program 3: 02:57:10 executing program 5: 02:57:10 executing program 2: 02:57:11 executing program 2: 02:57:11 executing program 0: 02:57:11 executing program 1: 02:57:11 executing program 5: 02:57:11 executing program 3: 02:57:11 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:11 executing program 0: 02:57:11 executing program 2: 02:57:11 executing program 5: 02:57:11 executing program 3: 02:57:11 executing program 1: 02:57:11 executing program 5: 02:57:11 executing program 1: 02:57:11 executing program 2: 02:57:11 executing program 0: 02:57:11 executing program 3: 02:57:12 executing program 5: 02:57:14 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:14 executing program 1: 02:57:14 executing program 0: 02:57:14 executing program 3: 02:57:14 executing program 2: 02:57:14 executing program 5: 02:57:15 executing program 0: 02:57:15 executing program 1: 02:57:15 executing program 3: 02:57:15 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'lo\x00\x00\x00\x00\b\x00'}) 02:57:15 executing program 2: 02:57:15 executing program 1: 02:57:17 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2b, 'memory'}]}, 0x8) 02:57:17 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef5", @ANYRESHEX], 0x0, 0xbf}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:57:17 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x27e, 0x0) 02:57:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRES32, @ANYRESHEX, @ANYRESHEX], 0x0, 0x6c}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:57:17 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 728.936628][T24421] ptrace attach of "/root/syz-executor.5"[24414] was attempted by "/root/syz-executor.5"[24421] 02:57:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) 02:57:18 executing program 3: prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x68000, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x5e0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:57:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000040)=""/177) 02:57:18 executing program 2: clone(0x3ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3, 0x43) 02:57:18 executing program 5: prctl$PR_SET_ENDIAN(0x14, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x5e0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) 02:57:18 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 729.548903][T24457] ptrace attach of "/root/syz-executor.3"[24456] was attempted by "/root/syz-executor.3"[24457] 02:57:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 02:57:21 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:21 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000001000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b93c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="eabe9f303b222977eecbc624877c", @ANYRESDEC, @ANYRESHEX, @ANYRESHEX], 0x0, 0x46}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:57:21 executing program 0: prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x68000, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r4 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x5e0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:57:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) unshare(0x24020400) preadv(r0, 0x0, 0x0, 0x0) 02:57:21 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 02:57:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2b93c05f1369c0400cd80"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYPTR64, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100018029a741efca44f837d0492482ba837296d961244ebee9b3b463fcd12e0c734057548c402cc43b3897cc677194cba4de275fd87f333c960dabc40dd887fc8daf872bf5b6edaf6b0be4241640eec0db2b50372063fd76011811f95368474ca8b5948bb5dad22082d770873306c5084b43ea3a1f3921c68b1eee", @ANYRESHEX], 0x0, 0xc5}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:57:21 executing program 1: prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f00000004c0)={@broadcast, @multicast1, @broadcast}, &(0x7f0000000500)=0xc) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x68000, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r4 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x5e0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:57:21 executing program 2: 02:57:21 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000004a40)='/dev/ppp\x00', 0x400000000008c00, 0x0) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000049c0)=ANY=[@ANYRESHEX=r2], &(0x7f00000017c0)='selinux\x00', 0x8, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sync_file_range(r3, 0x0, 0x0, 0x2) fallocate(r4, 0x0, 0x0, 0x2000002) fallocate(r3, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r4, 0x0, 0x8}) [ 732.348272][T24488] ptrace attach of "/root/syz-executor.5"[24486] was attempted by "/root/syz-executor.5"[24488] 02:57:21 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 02:57:22 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nlmon0\x00'}) 02:57:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3, 0x43) 02:57:22 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x106}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000080)={0x3c, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x2c, 0x0, [@generic="7c752d5cef8f6f7fc161280870", @typed={0x8, 0x0, @ipv4=@empty}, @typed={0x8, 0x0, @ipv4=@empty}, @typed={0x8, 0x0, @fd}]}]}, 0x3c}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:57:22 executing program 1: 02:57:22 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:22 executing program 2: 02:57:22 executing program 1: 02:57:22 executing program 3: 02:57:22 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:23 executing program 0: 02:57:23 executing program 2: 02:57:23 executing program 1: 02:57:23 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:23 executing program 3: 02:57:23 executing program 5: 02:57:23 executing program 1: 02:57:23 executing program 5: 02:57:23 executing program 3: 02:57:23 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20008) 02:57:23 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:23 executing program 0: 02:57:23 executing program 1: 02:57:23 executing program 5: 02:57:23 executing program 3: 02:57:23 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:23 executing program 2: 02:57:23 executing program 0: 02:57:23 executing program 5: 02:57:23 executing program 1: 02:57:23 executing program 3: 02:57:24 executing program 2: 02:57:24 executing program 5: 02:57:24 executing program 0: 02:57:24 executing program 1: 02:57:24 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:24 executing program 3: 02:57:24 executing program 2: 02:57:24 executing program 5: 02:57:24 executing program 0: 02:57:24 executing program 1: 02:57:24 executing program 3: 02:57:24 executing program 0: 02:57:24 executing program 2: 02:57:24 executing program 1: 02:57:24 executing program 5: 02:57:24 executing program 4: r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:24 executing program 3: 02:57:24 executing program 0: 02:57:25 executing program 1: 02:57:25 executing program 5: 02:57:25 executing program 2: 02:57:25 executing program 1: 02:57:25 executing program 3: 02:57:25 executing program 0: 02:57:25 executing program 1: 02:57:25 executing program 5: 02:57:25 executing program 2: 02:57:28 executing program 0: 02:57:28 executing program 4: r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:28 executing program 3: 02:57:28 executing program 1: 02:57:28 executing program 5: 02:57:28 executing program 2: 02:57:28 executing program 2: 02:57:28 executing program 0: 02:57:28 executing program 1: 02:57:28 executing program 3: 02:57:28 executing program 5: 02:57:28 executing program 1: 02:57:28 executing program 0: 02:57:31 executing program 4: r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:31 executing program 2: 02:57:31 executing program 5: 02:57:31 executing program 3: 02:57:31 executing program 1: 02:57:31 executing program 0: 02:57:31 executing program 5: 02:57:31 executing program 0: 02:57:31 executing program 1: 02:57:31 executing program 2: 02:57:31 executing program 3: 02:57:31 executing program 5: 02:57:34 executing program 2: 02:57:34 executing program 4: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(0x0, 0x800000015) 02:57:34 executing program 0: 02:57:34 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x0, 0x8001) 02:57:34 executing program 3: bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0), 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) 02:57:34 executing program 5: 02:57:34 executing program 0: 02:57:34 executing program 5: 02:57:34 executing program 2: 02:57:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 02:57:34 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e27, 0x0, @empty}, 0x1a) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 02:57:34 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 02:57:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="23ed0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x30) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 745.680232][T24738] input: syz1 as /devices/virtual/input/input111 [ 745.738292][T24742] ptrace attach of "/root/syz-executor.0"[24740] was attempted by "/root/syz-executor.0"[24742] [ 745.819578][T24741] input: syz1 as /devices/virtual/input/input112 02:57:35 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 02:57:35 executing program 4: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(0x0, 0x800000015) 02:57:35 executing program 3: 02:57:35 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c2", @ANYRESHEX, @ANYBLOB="e6c55c669fb82eec510100019b3d7280437a746297a2ebfb8dceaa76"], 0x0, 0x42}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:57:35 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0), 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) listen(0xffffffffffffffff, 0x0) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$sock(0xffffffffffffffff, 0x0, 0x10) removexattr(0x0, &(0x7f00000003c0)=ANY=[]) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 02:57:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) [ 746.136170][T24756] input: syz1 as /devices/virtual/input/input113 [ 746.143277][T24756] input: failed to attach handler leds to device input113, error: -6 [ 746.151309][T24760] ptrace attach of "/root/syz-executor.0"[24758] was attempted by "/root/syz-executor.0"[24760] 02:57:35 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000200)={0x7}, 0x7) 02:57:35 executing program 3: sched_setattr(0x0, &(0x7f0000000040)={0x100000192}, 0x0) 02:57:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000340)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'ip_vti0\x00', 0x402}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000005c0)={'\x84\xe1\"\x8b\xac\b\xda\x00', 0x400}) 02:57:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) 02:57:35 executing program 1: dup(0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000180)=""/181) 02:57:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x4, &(0x7f0000000040), &(0x7f00009c4ff0)) 02:57:35 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0), 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) 02:57:36 executing program 4: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(0x0, 0x800000015) 02:57:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = openat$ppp(0xffffffffffffff9c, 0x0, 0x400000000008c00, 0x0) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000049c0)=ANY=[@ANYRESHEX=r2], &(0x7f00000017c0)='selinux\x00', 0x8, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$P9_RCLUNK(r3, &(0x7f0000000200)={0x7}, 0x7) 02:57:36 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x11, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 02:57:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x4, &(0x7f0000000040), &(0x7f00009c4ff0)) 02:57:36 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYBLOB="e6c55c669eb82eec5101"], 0x0, 0x1c}, 0x20) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:57:36 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='.ou\x86\xf3=\x90\xc0\x83\x98@\xef6/\x90.y\x7f)\xd7\xf8\xd6#Y\x1a\xa7,]\xc9m\n\xe7px\xcf\x8et\x03\x11\x91\xd2\xcb\x03\x8b\xc2}5a\x9d\xb5O7\x04\xe8\xda\xc6A\x90<(\xf3\xb0\x85a\xcc\xb4\n\x18\xa7\xe2\xefazH*\x9f\x8bbnCzh87\xf1@:p\xf8\x02_\xeb\x81R-\x8ds\xbal\x11\x9b\x17\xcb\x85K\x1br\xc1\xda\xf6\x14X\xb3\xcb\xdc\x19D\xf7\xe3\xfeT<4q\xff\xf9U0-NGb8\x93\xbcw\xbc\xb6\x8d\fr\x1f\xbbD\xad\xb0\x84\xbdY!\x9f\x99\x12\xad~\xc1N1\x16=\xe6\x15\x9d\xebAr\xa3\xc2\x83\xa2g\xd0\x93XL\x83gT\x88\xb9\x16@\xc8\xa9\xa30\x10\xb2\xa6\xafO5\r\xc7v\x9e\xef!\xc1\xcb\xa5\x86\xcd\xb4>\n\\ \xbbI|\x00\x00\x00\x00\x00', 0x200002, 0x0) 02:57:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 747.196931][T24815] ptrace attach of "/root/syz-executor.1"[24810] was attempted by "/root/syz-executor.1"[24815] 02:57:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x4, &(0x7f0000000040), &(0x7f00009c4ff0)) 02:57:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) 02:57:36 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0), 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) listen(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) 02:57:36 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="05630440000000000e630c400000000000000000000000000f630c4000000000000000000000000011021c24cbbfa6ca1da905c614d4af5b9f19cde1de237ea808d94c30d14f32a5a000c539681124f907076e5baad6d3daa1cc50ee4433663ee19820bc84f6e2b998bf5910c2a3b359b8c8a46573f24a"], 0x0, 0x0, 0x0}) 02:57:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x4, &(0x7f0000000040), &(0x7f00009c4ff0)) 02:57:37 executing program 4: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:37 executing program 5: syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x2, 0x2, 0x543, 0x0, 0x60], [], @multicast2}, @mcast2={0xff, 0x5}, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 02:57:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000100)=@hat={'changehat ', 0x1}, 0x1d) 02:57:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00pI\x00', 0x3}, 0x18) ioctl(r0, 0x200000000008916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 02:57:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0D\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(0xffffffffffffffff, 0x800007, 0x0) fcntl$lock(r0, 0x0, &(0x7f00000004c0)) pipe(0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x40, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) write(r0, &(0x7f0000001280)="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", 0x800) fcntl$getownex(r1, 0x10, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x5f, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) fcntl$getown(r1, 0x9) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) sendto$inet(r2, 0x0, 0x2d9, 0x0, 0x0, 0x24d) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000100)={0x5, 0x2c94, 0x0, 0x22c6, 0x8001}) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) recvmmsg(r2, &(0x7f0000000240), 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r3+30000000}) io_setup(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000140)={0x0, 0x3, 0x3f, 0x1}) 02:57:37 executing program 4: r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:37 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x44, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="006340400000000000000000000100"/68], 0x4, 0x0, &(0x7f0000000540)="01cbdf0d"}) 02:57:38 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0D\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) recvmsg(r0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 02:57:38 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:39 executing program 5: socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240)=0x7, 0x12) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000400)='cpu&00&_\n\x00\x01\b\x00\x01\x9c\xd3\x0e5\xa0\x1d=\x04\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7\"\xb5yt\x82\xfb\x1d\x83\xf8.- \x00\x00\x00(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4#\xc5]Y;\xc16v\xf9\x89\t\x06\xbe*\xaa&\xbd\x16xQ\x8e\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dX5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\a\x01\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x01\x00\x00\x00\x01\x00\x00\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xfe\x1f\xe5\x86\xb1xu&\xfb\xf2\xbf\xe8\x7f\x91\x93\xab\x05\x004\x85\x86l\x8d\x00'/289) 02:57:41 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000000200)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000380)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r1, r2) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x83e, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000005400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:57:41 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:41 executing program 5: socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b00)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xe170) 02:57:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) 02:57:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000440)='clear_refs\x00\xb0I\v8e\x84V\x1f\x13.\xd2e\xc6\xd1\x00x\xe6\fK\xa3/\xd7\xb9Iq\\\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\xac\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=/\x89\x06r\b\'Ho\xf7\x88B7e\bU\'\x83\xf0\x9c\xbf\xdc7\xf8;\xea}\xa8\x9fvs\xc4\xd36\t\x1eu7L\xe0\xb0~?\xdb\xf9t]5\x0e\xe0\xad\xa2_\xadL\xe6\xc4\xed\\\x85:5\b\x9b\xa0.h|\x84\x05\x00\xdd5\x0e\xb1\x18\x06\xbf\xe2\xd61\xc1\xa0-\x18\x12\xba\xa2\xf1\xc2D\x92\xd4\xc5\xf7$\x18\x8a\b/\x8e\xa2\xf07\xa9\x05x\xa91\xd6\x9f\x15\x18vX\x9b\xa4\x95\x83\xd0\xee\x92\xb1\xcb&y\xa7F\xb2\x8fsp{\xb64\xd4!\xf5d_\xea ;\x11\a\xd0\x18\xa8\xba\x1f\x95\xa5\xa6{f\xb2\xd2\x9f') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0D\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa9\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') close(r0) 02:57:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8916, &(0x7f00000000c0)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00\x00\x00\x00\x00\x80\x00\x00\n\xf4D3A}\xe4\xac\xff\x82q\xc7J\xe2J?\x00\x8b\x9c[\xdd\x06\xa4\n') 02:57:41 executing program 1: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000507ed0080648c6394f26b31d200100010404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 753.034810][T25010] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 753.075432][T25012] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 02:57:44 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:44 executing program 1: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000080)=[{r0, 0x3}, {r0}], 0x2, 0x0) poll(&(0x7f0000000100)=[{r0, 0x9}], 0x1, 0x4e) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x10101, 0x0, 0x0, 0x800e0091e) accept4(r0, 0x0, 0x0, 0x0) shutdown(r1, 0x0) 02:57:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/152, 0x98}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = dup2(r1, r0) semop(0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x0, 0x0, 0x800e00521) shutdown(r2, 0x0) 02:57:44 executing program 2: poll(&(0x7f0000000100)=[{}, {}], 0x2, 0x8020000000047) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x104, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x7760cef5, 0x40042, 0x0, 0x800e00510) shutdown(r0, 0x0) 02:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000100)=[{r0}, {}], 0x2, 0x8020000000047) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x104, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x7760cef5, 0x40042, 0x0, 0x800e00510) shutdown(r1, 0x0) 02:57:44 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:44 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/152, 0x98}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = dup2(r1, r0) semget(0x3, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r2, 0x0) 02:57:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000080)=[{r0, 0x3}, {r0}], 0x2, 0x0) poll(&(0x7f0000000100)=[{r0, 0x9}, {r0}], 0x2, 0x4e) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x10101, 0x0, 0x0, 0x800e0091e) accept4(r0, 0x0, 0x0, 0x0) shutdown(r1, 0x0) 02:57:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) pipe(0x0) r1 = creat(0x0, 0x43) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = msgget(0x0, 0x1) msgctl$IPC_RMID(r3, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000480)="fd44847cd95d96fecc2c2c4348ff61124c331a8e0d4705199fab7007f91eceb9c18c6b6da41d5a538bcd2cc497049b9dd1f97ac72a29db131a544ad0e4", 0x3d) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) recvfrom(r4, &(0x7f0000000140)=""/163, 0x100000345, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendto$unix(r4, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r4, &(0x7f0000003240)=""/4096, 0x100000205, 0x0, 0x0, 0x415) sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"/298], 0x1}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) keyctl$describe(0x6, 0x0, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000440)={'syz', 0x3}) 02:57:44 executing program 1: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:47 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:47 executing program 1: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = timerfd_create(0x8, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) 02:57:47 executing program 2: syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x57a1, 0x20) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) 02:57:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/112, 0x70}], 0x1, 0x4c000000) 02:57:47 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$KDSKBLED(r0, 0x4b65, 0x8) tgkill(0x0, 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x10000101) [ 758.511213][T25090] mmap: syz-executor.2 (25090) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:57:47 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff84, &(0x7f0000000040), 0x177}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r3, &(0x7f00000016c0)=[{&(0x7f0000000480)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r2, 0x0) 02:57:47 executing program 1: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:47 executing program 2: utimensat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', &(0x7f0000000300), 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x10003) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:57:47 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) read(r0, 0x0, 0x0) 02:57:47 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) 02:57:47 executing program 1: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000380)={0x28, 0x0, &(0x7f0000000440)=[@acquire, @request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:50 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x3, 0x0) recvmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="230000005a00817491bc655067d7aee4050c00000f00030003000000acecf0a3000000", 0x23}], 0x1}, 0x0) 02:57:50 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$kcm(0x11, 0x2, 0x300) socket$kcm(0x2, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000001640), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000140)) sendmsg(r2, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2, 0x7811000000000000}, 0x80, &(0x7f0000000000), 0x149, &(0x7f00000002c0)}, 0x200000000000000) 02:57:50 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x400) clock_gettime(0x0, &(0x7f0000001480)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000001400)=[{{&(0x7f0000000280)=@ax25={{0x3, @rose}, [@default, @netrom, @rose, @rose, @default, @netrom, @netrom, @bcast]}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000380)=""/134, 0x86}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000540)=""/180, 0xb4}, {&(0x7f0000000600)=""/172, 0xac}, {&(0x7f00000006c0)=""/163, 0xa3}, {&(0x7f0000000780)=""/216, 0xd8}, {&(0x7f0000000300)=""/55, 0x37}], 0x7}, 0xbd2c}, {{&(0x7f00000008c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000940)=""/32, 0x20}, {&(0x7f0000000980)=""/80, 0x50}, {&(0x7f0000000a00)=""/180, 0xb4}, {&(0x7f0000000ac0)=""/73, 0x49}, {&(0x7f0000000b40)=""/93, 0x5d}], 0x5, &(0x7f0000000c00)=""/29, 0x1d}, 0x1}, {{&(0x7f0000000c40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000cc0)=""/173, 0xad}, {&(0x7f0000000d80)=""/248, 0xfffffffffffffe6e}, {&(0x7f0000000e80)=""/191, 0xbf}, {&(0x7f0000000f40)=""/81, 0x51}, {&(0x7f0000000fc0)=""/86, 0x56}, {&(0x7f0000001040)=""/247, 0xf7}, {&(0x7f0000001140)=""/82, 0x52}], 0x7}, 0xffffffffffffff00}, {{&(0x7f0000001200)=@nfc_llcp, 0x80, &(0x7f0000001380)=[{&(0x7f0000001280)=""/204, 0xcc}], 0x1, &(0x7f00000013c0)}, 0x1000000000000}], 0x4, 0x2, &(0x7f00000014c0)={r2, r3+30000000}) r4 = socket$inet(0x2, 0x800, 0x80000001) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000), 0x10) r5 = gettid() sched_getscheduler(r5) r6 = memfd_create(&(0x7f0000000100)='/dev/loop#\x00', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{0xffffffffffffffff, 0x1200}, {r4, 0x80}], 0x2, &(0x7f00000001c0)={r7, r8+30000000}, &(0x7f0000000200)={0x7f}, 0x8) sendfile(r0, r0, 0x0, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 02:57:50 executing program 5: 02:57:50 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 761.517277][T25134] binder: 25133:25134 ioctl c0306201 0 returned -14 02:57:50 executing program 5: 02:57:50 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 761.604816][T25143] netlink: 'syz-executor.0': attribute type 3 has an invalid length. [ 761.671376][T25150] binder: 25149:25150 ioctl c0306201 0 returned -14 02:57:50 executing program 5: 02:57:50 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 02:57:50 executing program 0: openat$full(0xffffffffffffff9c, 0x0, 0x8a1d324753c1c076, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 02:57:50 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) [ 761.974109][T25162] binder: 25158:25162 ioctl c0306201 0 returned -14 02:57:53 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:57:53 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:53 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) 02:57:53 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x0) 02:57:53 executing program 0: 02:57:53 executing program 2: 02:57:53 executing program 0: 02:57:53 executing program 2: 02:57:53 executing program 3: 02:57:53 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:57:54 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:57:54 executing program 3: 02:57:54 executing program 5: 02:57:56 executing program 2: 02:57:56 executing program 0: 02:57:56 executing program 5: 02:57:56 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:56 executing program 3: 02:57:56 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x18, 0x0, &(0x7f0000000440)=[@acquire, @request_death], 0x0, 0x0, 0x0}) 02:57:56 executing program 0: 02:57:56 executing program 2: 02:57:56 executing program 5: 02:57:56 executing program 3: 02:57:57 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:57 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x18, 0x0, &(0x7f0000000440)=[@acquire, @request_death], 0x0, 0x0, 0x0}) 02:57:57 executing program 2: 02:57:57 executing program 5: 02:57:57 executing program 0: 02:57:57 executing program 3: 02:57:57 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:57 executing program 5: 02:57:57 executing program 0: 02:57:57 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x18, 0x0, &(0x7f0000000440)=[@acquire, @request_death], 0x0, 0x0, 0x0}) 02:57:57 executing program 2: 02:57:57 executing program 5: 02:57:57 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x18, 0x0, &(0x7f0000000440)=[@acquire, @clear_death], 0x0, 0x0, 0x0}) 02:57:57 executing program 3: 02:57:57 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:57 executing program 0: 02:57:57 executing program 5: 02:57:57 executing program 2: 02:57:57 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x18, 0x0, &(0x7f0000000440)=[@acquire, @clear_death], 0x0, 0x0, 0x0}) 02:57:58 executing program 3: 02:57:58 executing program 0: 02:57:58 executing program 5: 02:57:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:58 executing program 2: 02:57:58 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x18, 0x0, &(0x7f0000000440)=[@acquire, @clear_death], 0x0, 0x0, 0x0}) 02:57:58 executing program 0: 02:57:58 executing program 3: 02:57:58 executing program 5: 02:57:58 executing program 2: 02:57:58 executing program 0: 02:57:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:58 executing program 3: 02:57:58 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x20, 0x0, &(0x7f0000000440)=[@request_death, @clear_death], 0x0, 0x0, 0x0}) 02:57:58 executing program 5: 02:57:58 executing program 2: 02:57:58 executing program 3: 02:57:58 executing program 0: 02:57:59 executing program 5: 02:57:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) fallocate(r0, 0x0, 0x8, 0x7) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) bind(r0, &(0x7f0000000800)=@vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x80) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xfffffdef) r6 = getpgrp(0x0) sched_setscheduler(r6, 0x1, &(0x7f0000000040)) keyctl$setperm(0x5, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000440)="f9f50a572e24635a939fad0b553a1cbe5f9d05d28534692650110e53733103b17cab7dd1aa418f7a5cc6038a5bc016f6283dd7d2de89f1babb292363257953436b5b0fb06575835aecc06b09838dd4a8c91015577796026c2b24b915f62857e3ebfbd1c4d3db9bbb9d65f90e62c4a77586811da9cdf96fc17e59e88932296830", 0x80}], 0x1, 0x0, 0x0, 0x50}, 0x40000) r7 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ptrace$cont(0x9, r6, 0x4, 0x3ff) write$uinput_user_dev(r7, &(0x7f0000000880)={'syz0\x00', {}, 0x43, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25688812], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) ioctl$UI_DEV_SETUP(r7, 0x5501, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSFF(r8, 0x402c4580, &(0x7f00000002c0)={0x57}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000003c0)={{0x2, 0x4e24, @remote}, {0x6, @broadcast}, 0x72, {0x2, 0x4e22, @broadcast}, 'nr0\x00'}) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f00000009c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) getsockopt$inet_mreqsrc(r1, 0x0, 0x10025, &(0x7f0000000880)={@broadcast, @broadcast, @remote}, &(0x7f0000000940)=0x1) 02:57:59 executing program 2: 02:57:59 executing program 3: 02:57:59 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:59 executing program 0: 02:57:59 executing program 5: 02:57:59 executing program 3: 02:57:59 executing program 2: 02:57:59 executing program 0: 02:57:59 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:57:59 executing program 5: 02:57:59 executing program 2: [ 770.646292][T25340] input: syz0 as /devices/virtual/input/input121 02:58:00 executing program 0: 02:58:00 executing program 3: 02:58:00 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:00 executing program 2: 02:58:00 executing program 1: 02:58:00 executing program 5: 02:58:00 executing program 0: 02:58:00 executing program 3: 02:58:00 executing program 1: 02:58:00 executing program 2: 02:58:00 executing program 5: 02:58:01 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:01 executing program 0: 02:58:01 executing program 2: 02:58:01 executing program 1: 02:58:01 executing program 3: 02:58:01 executing program 5: 02:58:01 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:01 executing program 0: 02:58:01 executing program 1: 02:58:01 executing program 2: 02:58:01 executing program 3: 02:58:01 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:01 executing program 5: 02:58:01 executing program 0: 02:58:01 executing program 1: 02:58:01 executing program 2: 02:58:01 executing program 3: 02:58:02 executing program 5: 02:58:02 executing program 0: 02:58:02 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:02 executing program 1: 02:58:02 executing program 5: 02:58:02 executing program 2: 02:58:02 executing program 3: 02:58:02 executing program 0: 02:58:02 executing program 5: 02:58:02 executing program 1: 02:58:02 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:02 executing program 0: 02:58:02 executing program 3: 02:58:02 executing program 2: 02:58:02 executing program 1: 02:58:02 executing program 5: 02:58:02 executing program 0: 02:58:03 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:03 executing program 2: 02:58:03 executing program 5: 02:58:03 executing program 3: 02:58:03 executing program 1: 02:58:03 executing program 2: 02:58:03 executing program 0: getpid() r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x81}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000200)) r3 = syz_open_pts(r2, 0x0) readv(r3, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x10}, {&(0x7f0000000280)=""/243}, {&(0x7f00000001c0)=""/20}, {&(0x7f0000000380)=""/124}], 0x2c0) 02:58:03 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:03 executing program 3: getpid() syz_genetlink_get_family_id$nbd(0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401, 0x5, 0x100000000, 0x81, 0x0, 0x0, 0x800}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x10}, {&(0x7f0000000280)=""/243}, {&(0x7f00000001c0)=""/20}, {&(0x7f0000000380)=""/124}], 0x2c0) 02:58:03 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lremovexattr(0x0, 0x0) 02:58:03 executing program 2: 02:58:03 executing program 1: 02:58:03 executing program 2: 02:58:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), 0x0) listen(0xffffffffffffffff, 0x1) r0 = creat(&(0x7f0000000400)='.\x00', 0x100) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000005c0)={0x8, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}]}) syz_extract_tcp_res$synack(&(0x7f0000000740), 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) 02:58:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xa200, 0x51) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x27000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f0000000080)=0x6e) unlink(&(0x7f0000000040)='./file0\x00') 02:58:03 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:03 executing program 3: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x401, 0x5, 0x0, 0x81}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x10}, {&(0x7f0000000280)=""/243}, {&(0x7f00000001c0)=""/20}, {&(0x7f0000000380)=""/124}], 0x2c0) [ 774.898234][T25504] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:58:04 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:04 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:04 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00\x00\x00z', 0xffffffffffffffdb}) 02:58:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = memfd_create(&(0x7f00000001c0)='G\'\x00\x9c\x1cH\xf9\x9e\x00\x16~\xdb`\x89\x86\x9a\xd4\xceof-\xbc\x12\x94\xe7\xcbH\x8dU;Z\xfc\xe1id?\xd4\x8a\x00Y@\xfe\xfe\b\x8d\xd0\x84\xcd\xf5\xd5\x83\xec\x96;\x16\x17\xf2\xba\xe1=\xe6.\xa5|\x02q', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r1, 0x0) 02:58:04 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) ppoll(&(0x7f0000000240)=[{r2}, {r2}], 0x2, 0x0, 0x0, 0x0) 02:58:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clock_nanosleep(0x2, 0x0, &(0x7f0000000240)={0x0, 0x989680}, 0x0) r1 = gettid() getuid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x800000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x800040000000015) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_open_dev$mouse(0x0, 0x0, 0x0) 02:58:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:04 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:04 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:04 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/net/pfkey\x00', 0x240, 0x0) 02:58:04 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x2}) 02:58:04 executing program 1: syslog(0x0, 0x0, 0x0) 02:58:05 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0xc, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x18) 02:58:05 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:05 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@initdev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x1000000000800, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x20) 02:58:05 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 02:58:05 executing program 1: syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) 02:58:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$eventfd(r1, 0x0, 0x2cd) 02:58:05 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:05 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:05 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00\x00\x00z'}) 02:58:05 executing program 0: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') syz_open_dev$vcsa(0x0, 0x0, 0x0) 02:58:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x3ff}) [ 776.963416][T25617] bridge0: port 2(bridge_slave_1) entered disabled state [ 776.971243][T25617] bridge0: port 1(bridge_slave_0) entered disabled state 02:58:06 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x61) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000000)) 02:58:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10000}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x61) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)) 02:58:06 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:06 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x61) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000000)) 02:58:06 executing program 5: ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) syz_open_procfs(0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) getpgrp(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r0, r1, 0x0, 0x80000000) 02:58:06 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:06 executing program 3: r0 = socket$inet6(0xa, 0x803, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00\x00\x00z'}) 02:58:06 executing program 2: mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:06 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000180)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc08000200ac141410", 0x24) 02:58:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000006840), 0xc, &(0x7f0000006800)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001d00070f000000000000000007000000", @ANYRES32=r3, @ANYBLOB="00b20a000a000200aaaaaaaaaaaa0400"], 0xec}}, 0x0) 02:58:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000006840), 0xc, &(0x7f0000006800)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001d00070f000000000000000007000000", @ANYRES32, @ANYBLOB="00b20a000a000200aaaaaaaaaaaa0400"], 0xec}}, 0x0) 02:58:06 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:07 executing program 2: mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) 02:58:07 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) 02:58:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000380)={0x8}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x3ff}) [ 778.262268][ T31] audit: type=1800 audit(1565924287.308:36): pid=25680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="file0" dev="ramfs" ino=99837 res=0 02:58:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) syncfs(r0) 02:58:07 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:07 executing program 2: mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:07 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101e4f8d1b1", @ANYRESHEX], 0x0, 0xe0}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:07 executing program 3: socketpair$unix(0x1, 0x40000000005, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60d8652b00002c00fe8000000000000089000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50a993b54bfa95975169e6303de68d3618a0a20509b5a6f72aa76201c5f706e65f72659c7980e9f9ad2fdaae5841887d392a265793d04cd78ad8fdf8cd57176cf3d3f3dd8a735bf254179801dfa4c8351cdefef77ab7c95d77335006c8e88f983cc55747e1d33d8dc7fb7c46c2e8593a089d47b332ea00"/132], 0x0) 02:58:07 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x2cd) [ 778.616608][T25697] ptrace attach of "/root/syz-executor.1"[25696] was attempted by "/root/syz-executor.1"[25697] 02:58:07 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="eabe9f303b222957"], 0x0, 0x8}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:07 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:07 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:07 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002780)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/82, 0x52}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)=""/114, 0x72}}], 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00b\x18\xcd\xaaA\xaf\xf1W\xde\x91Y\xb2\x03\xf2,\xdf\x97\xf1\x99\xe0\x9a@$\xd9ll\t8\x94\x884|\xb4\xf2\xbc\xea\v|q:\xb4\xb7\x19\x15\xfd\xca\xd6\xb8: =D\xdd\xc8Y\xd2\xfb\xc9\xb3\x9d\xc1l\xcd0\b\xd4\x03\xd0iR\xb4\xf44\"I\xadU\x1fA\x14\xf6\xa07\x05\x82\xbd\x1a\xe3\xcc\xc6iX\xe9\x84\x04\\\xfbQ2\b\x8e\bX\x18\xafb\xbe\xf8\x1bH\xd3\xa5~\xe9k8\x85\xc7W\x9b2\xe7\xc4\xc7\x84?\xc4Q>\x00\x00\x00\x00\x00\x00\x00\x00\x006\x86!fe\xf3^}\x8b \x89\x1c4\xdev\xb8\xc5\x04\x9c\x1a\xa7\xa7\x15SV\xbd\xe2\n\x97\x85]\xb4\x8ec\xf3s0\xd6\x0f\xc5L\x947\xad7x\xe3\xc0~\xf8k\xab\xcf%<\x93\x11\xd7\xd1\x1c\xf3}]\x83\xec$\xcf\xdd\xd4\x95ta;\xb8\xe3\xc6\xfc\a<|\x97d\xc2c\xb3\xa4\x0f\b\' \x11\x8b\xcc\xd6&h\xb3Y\xbc\xf96\x97w\x16\x19D6+\x18#\xb3\x06PR\xc4k\x8f\x1c\xdd\x9d\xd1\x19J\xfa\x11\xa1\x16\xbfn28y\xb5\a\x8d\xbd\x96\xe76U\f\xaf\xe6\xccNQj\xfbD\xe7\x1aW7\xde\x04\xc2C\n\x91\x03') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 02:58:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x2, 0x0) r2 = dup2(r1, r1) write$UHID_DESTROY(r2, &(0x7f0000000200), 0x4) write$UHID_CREATE(r2, 0x0, 0x0) 02:58:07 executing program 0: io_submit(0x0, 0x2, &(0x7f0000000780)=[0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700), 0x100000000000000d) 02:58:07 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, 0x1b) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4000000) 02:58:10 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:10 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) 02:58:10 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef5", @ANYRESHEX], 0x0, 0xd6}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80000000080003, 0x20000000003c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000001180), 0x240, &(0x7f00000011c0)}}], 0x249, 0x0) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 02:58:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c2af5e87a64800546a1ebed56a0080000000000000", @ANYRESHEX, @ANYBLOB="e6c55c669fb82eec510100019b3d7280437a746297a2ebfb8dceaa7686"], 0x0, 0x57}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:10 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) recvfrom(r0, 0x0, 0x0, 0x40012102, 0x0, 0x0) [ 781.672834][T25751] ptrace attach of "/root/syz-executor.5"[25749] was attempted by "/root/syz-executor.5"[25751] 02:58:10 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000180)) 02:58:11 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 02:58:11 executing program 1: socketpair$tipc(0x2c, 0x3, 0x0, &(0x7f00000004c0)) 02:58:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3}, 0xa, 0x0) 02:58:13 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:13 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:58:13 executing program 0: socketpair$tipc(0x1e, 0x3, 0x0, &(0x7f00000004c0)) 02:58:13 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x4) 02:58:13 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 02:58:13 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:14 executing program 3: syz_open_dev$evdev(0x0, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000180)=@known='com.apple.FinderInfo\x00') write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, 0x0, 0x0) 02:58:14 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 02:58:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) 02:58:14 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') [ 785.092931][T25807] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 785.092931][T25807] program syz-executor.3 not setting count and/or reply_len properly 02:58:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 785.304467][T25819] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 785.304467][T25819] program syz-executor.0 not setting count and/or reply_len properly [ 785.411133][T25824] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 785.411133][T25824] program syz-executor.0 not setting count and/or reply_len properly 02:58:16 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:16 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:16 executing program 1: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400ffff010000000000"], 0x1}}, 0x0) 02:58:16 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x209e20, 0x8000000001}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0028000]}, 0x2c) 02:58:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)='security.evm\x00', 0x0, 0x0, 0x0) 02:58:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:58:17 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="00f3"], 0x0, 0x2}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fstatfs(r1, &(0x7f0000000040)=""/35) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:58:17 executing program 3: syz_emit_ethernet(0x12, &(0x7f0000000040)={@local, @random="265269eb77ea", [{}], {@generic={0x8035}}}, 0x0) 02:58:17 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:17 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe0200000002080004001e000400ff7e", 0x24}], 0x1}, 0x0) 02:58:17 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(0x0, &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x2d1, 0x400000) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x9, &(0x7f0000000140), 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:58:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7d, 0x0, &(0x7f0000000100)) [ 788.535466][T25867] netlink: 'syz-executor.5': attribute type 30 has an invalid length. 02:58:17 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(0xffffffffffffffff, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x800000015) 02:58:17 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(0x0, &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000000), 0x4) 02:58:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xc, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:58:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x1}) 02:58:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getsockopt$inet6_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000040)) 02:58:18 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, 0x0) tkill(r0, 0x800000015) 02:58:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a8091", 0x39}], 0x1}, 0x0) 02:58:18 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(0x0, &(0x7f0000000100)=@known='security.apparmor\x00') 02:58:18 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/mnt\x00') 02:58:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x600, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0028000]}, 0x2c) 02:58:18 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:58:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000180)) 02:58:18 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, 0x0) tkill(r0, 0x800000015) 02:58:18 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={0xffffffffffffffff, 0x11, 0x1, 0x0, 0x0}, 0x20) 02:58:18 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000a40)={{}, {0x1, 0x1}, [{0x2, 0x3}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x4}, [{0x8, 0x4}, {0x8, 0x1}, {0x8, 0x4}, {0x8, 0x3}, {0x8, 0x4}, {0x8, 0x1}], {0x10, 0x4}, {0x20, 0x3}}, 0x6c, 0x2) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca97d6e", 0x6d, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 02:58:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x9}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) [ 789.728631][T25933] PKCS8: Unsupported PKCS#8 version 02:58:18 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 02:58:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)) 02:58:18 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x1000000, {0x0, @empty, 'nr0\x00'}}, 0x1e) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r2 = semget(0x3, 0xffffffffffffffff, 0x20) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @local}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) fstat(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = dup3(r0, r0, 0x80000) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r8, 0x4010ae74, &(0x7f0000000ac0)={0x0, 0x0, 0x5}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000a40)={{}, {0x1, 0x1}, [{0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x2, r5}], {0x4, 0x4}, [{0x8, 0x4, r6}, {0x8, 0x1, r7}, {0x8, 0x4, r9}, {0x8, 0x3, r10}, {0x8, 0x4}, {0x8, 0x1}, {0x8, 0x7}], {0x10, 0x4}, {0x20, 0x3}}, 0x74, 0x2) r11 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x5, 0x10001) semop(r2, &(0x7f0000000080)=[{0x3, 0x2, 0x800}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)="3058020af10cb8b56c9606987fe808d672bd136840d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a939b4fd2672693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697863e6ebd80f75cadcb79366256287fca97d6e", 0x6d, 0xfffffffffffffffd) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r11, 0x12, 0x3, &(0x7f0000000180)=0x65, 0x4) 02:58:18 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, 0x0) tkill(r0, 0x800000015) 02:58:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:58:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getsockopt$inet6_tcp_int(r0, 0x6, 0xb, 0x0, &(0x7f0000000040)) [ 790.079780][T25940] PKCS8: Unsupported PKCS#8 version 02:58:19 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 790.166728][T25953] PKCS8: Unsupported PKCS#8 version 02:58:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:58:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0}) tkill(r0, 0x800000015) 02:58:19 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) 02:58:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x20a, 0x200000000000000) 02:58:19 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, 0x0, 0x0) [ 790.519800][T25981] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 790.519800][T25981] program syz-executor.1 not setting count and/or reply_len properly [ 790.640787][T25987] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 790.640787][T25987] program syz-executor.1 not setting count and/or reply_len properly 02:58:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0}) tkill(r0, 0x800000015) 02:58:19 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x800) readv(r0, &(0x7f00000010c0)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1) 02:58:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) 02:58:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000040)='@\x00', 0x2, 0x0) 02:58:20 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000080)=""/250, 0xfa}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e40)="98", 0x1}], 0x1}, 0x0) 02:58:20 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r1, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) fremovexattr(r0, 0x0) [ 791.038100][T26003] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 791.038100][T26003] program syz-executor.2 not setting count and/or reply_len properly 02:58:20 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0}) tkill(r0, 0x800000015) [ 791.194977][T26011] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 791.194977][T26011] program syz-executor.2 not setting count and/or reply_len properly [ 791.285063][T26016] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 791.285063][T26016] program syz-executor.5 not setting count and/or reply_len properly [ 791.429668][T26016] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 791.429668][T26016] program syz-executor.5 not setting count and/or reply_len properly 02:58:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0xd3, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 02:58:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x1}) 02:58:20 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="24000000190007041dfffd946f6105000a600000fe0200020002080008001e000400ff7e", 0x24}], 0x1}, 0x0) 02:58:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getsockopt$inet6_tcp_int(r0, 0x6, 0x12, 0x0, &(0x7f0000000040)) 02:58:20 executing program 4: gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(0x0, 0x800000015) 02:58:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x7d, &(0x7f0000000340), &(0x7f0000000100)=0x8) 02:58:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x801, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)='#', 0x1}], 0x1, 0x0, 0x0, 0x3c01}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0x210, "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"}, &(0x7f0000000100)=0x218) 02:58:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) write(r0, &(0x7f0000000100)="b63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cebc9bc2feffffffffffffffe22c9b160096aa1fae1acfbd6cbf87798a9b02de7a91a3cbdfa009cf75a7eadb2a00", 0x48) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 02:58:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x2d1, 0x0) 02:58:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r1) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1], 0x14}, 0x0) recvmmsg(r2, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 791.954138][T26051] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 791.954138][T26051] program syz-executor.5 not setting count and/or reply_len properly 02:58:21 executing program 0: [ 792.066039][T26051] sg_write: data in/out 167162/24 bytes for SCSI command 0xff-- guessing data in; [ 792.066039][T26051] program syz-executor.5 not setting count and/or reply_len properly 02:58:21 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:58:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='\x02\x00\x00\x00\x00\x00\x00\x00r\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe7c}, 0x21) 02:58:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000440)='./file0\x00', &(0x7f0000000800)='reiserfs\x00', 0x0, 0x0) 02:58:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca5055e0bcfe47bf070") getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) 02:58:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000300)={0xfc, 0x0, 0x0, "60b483b235582b85a8771ca00f9713a5e1f600a80f3d2b7c958dec6b42fd6e6fb5224f15f10422d6bec67aee8fd085e3deb82217484d47b96cd7b28e689b37281d1dc49a89c29b13e468083d395e8aa8162ac2d504c7c24354d51755b062e96e4da5aec83ee863f3841088ce85eb8a6bcc990ec6791591c492340bfe7533cc22f822ede198b553708077f48ba8f9b69fc2cb25cda500a1bff369225e53df584c960f3efdd7ef079bf53f71558089c2894eb97687920e13931306b72d438f86d54a2d0fb85014a753dc984af9ebf193176aa099845a56e0a04672e6245c9132f4e6b55acb7894d7e0c71bb9f45e61d5312442dc36a7f94c716ba88980"}) 02:58:21 executing program 4: gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(0x0, 0x800000015) 02:58:21 executing program 1: 02:58:21 executing program 3: 02:58:21 executing program 5: 02:58:21 executing program 3: 02:58:21 executing program 1: 02:58:21 executing program 0: 02:58:22 executing program 2: 02:58:22 executing program 5: 02:58:22 executing program 1: 02:58:22 executing program 0: 02:58:22 executing program 2: 02:58:22 executing program 4: gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(0x0, 0x800000015) 02:58:22 executing program 2: 02:58:22 executing program 0: 02:58:22 executing program 3: 02:58:22 executing program 1: 02:58:22 executing program 5: 02:58:22 executing program 3: 02:58:22 executing program 0: 02:58:22 executing program 5: 02:58:22 executing program 1: 02:58:22 executing program 2: 02:58:23 executing program 3: 02:58:23 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x0) 02:58:23 executing program 2: 02:58:23 executing program 0: 02:58:23 executing program 5: 02:58:23 executing program 1: 02:58:23 executing program 3: 02:58:23 executing program 5: 02:58:23 executing program 3: 02:58:23 executing program 2: 02:58:23 executing program 1: 02:58:23 executing program 0: 02:58:23 executing program 5: 02:58:24 executing program 3: 02:58:24 executing program 2: 02:58:24 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x0) 02:58:24 executing program 0: 02:58:24 executing program 1: 02:58:24 executing program 5: 02:58:24 executing program 2: 02:58:24 executing program 5: 02:58:24 executing program 1: 02:58:24 executing program 3: 02:58:24 executing program 0: 02:58:24 executing program 5: 02:58:24 executing program 1: 02:58:24 executing program 2: 02:58:25 executing program 3: 02:58:25 executing program 0: 02:58:25 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f0000000400)={0x0, 0x0, 0x2}) tkill(r0, 0x0) 02:58:25 executing program 1: 02:58:25 executing program 5: 02:58:25 executing program 2: 02:58:25 executing program 5: 02:58:25 executing program 3: 02:58:25 executing program 1: 02:58:25 executing program 2: 02:58:25 executing program 0: 02:58:25 executing program 2: 02:58:25 executing program 5: 02:58:26 executing program 1: 02:58:26 executing program 0: 02:58:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) 02:58:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0x3) read(r0, &(0x7f0000000040)=""/11, 0xfffffcfb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)) 02:58:26 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 02:58:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$l2tp(0x18, 0x1, 0x1) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 02:58:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x15, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 02:58:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x22, &(0x7f0000000140)={0x0, 0x0}, 0x10) 02:58:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") umount2(0x0, 0x11) 02:58:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x2000000000) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) 02:58:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, 0x0, &(0x7f00009c4ff0)) 02:58:26 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000dc9ff0), 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x3) 02:58:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:58:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef", 0x11) 02:58:26 executing program 4: socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x11, 0xa, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001b00)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xe170) 02:58:26 executing program 3: semop(0x0, &(0x7f0000000080)=[{}, {0x0, 0xffffffff}], 0x2) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x6}], 0x1) 02:58:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x28, &(0x7f0000000140)={0x0, 0x0}, 0x10) [ 798.262858][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 798.269464][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 798.362054][ T31] audit: type=1800 audit(1565924307.408:37): pid=26291 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="ramfs" ino=103759 res=0 02:58:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000680)='cpuacct.usage_percpu\x00') sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) 02:58:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 02:58:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:27 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, 0x0, 0xc}, 0x20) 02:58:27 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xfffffffffffffffe) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x0, r1}) 02:58:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000040)={0x20}, 0x20) 02:58:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0xc, 0x0, 0x0, 0x0}, 0x20) 02:58:27 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001580)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0xfdbe) 02:58:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)}, 0x0) 02:58:28 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000000), 0x4) 02:58:28 executing program 4: r0 = semget$private(0x0, 0x20000000102, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0xffffffff}], 0x1) semop(r0, &(0x7f00000000c0)=[{0x0, 0x6}], 0x1) 02:58:28 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{}, "463788f8e0ea08ba", "13c2adb0ab37db30b20dab106bc5c02e", "462be8f8", "85883fb43550e1c1"}, 0x28) 02:58:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) read$FUSE(r1, 0x0, 0xc) 02:58:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) 02:58:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x9, &(0x7f0000000140)={0x0, 0x0}, 0x10) 02:58:28 executing program 4: chdir(0x0) r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r0, 0x28007d) sendfile(r0, r0, 0x0, 0x2008000fffffffe) 02:58:28 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="02030002160000000000000000000000040003000500000000000000000000000000000000000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000a74af089d089046304000400000000000000000000000000000000000000000000000000000000000200010000000000000000000000000005000500000000000a00000000000000fe800000000000000000ff000000000000000094e2cad24e6221719548451926f21f48f460df18"], 0x200000f0}}, 0x0) 02:58:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 02:58:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) 02:58:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x5, &(0x7f0000000140)={0x0, 0x0}, 0x10) 02:58:28 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1}, 0x14) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000294, 0x0) 02:58:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x10}, {&(0x7f0000000280)=""/243}, {&(0x7f00000001c0)=""/20}, {&(0x7f0000000380)=""/124, 0xefefff7f}], 0x2c0) 02:58:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) 02:58:29 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01}, 0x3f00) close(r1) 02:58:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 02:58:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:29 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0xe6c}, {&(0x7f0000000240)=""/147, 0x71f}], 0x2, &(0x7f0000002740)=""/218, 0x52}}], 0x400008c, 0x2, &(0x7f0000002e40)={0x77359400}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0xffffffffffffff0e, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) 02:58:29 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000000)={0x2}) 02:58:29 executing program 5: syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 02:58:29 executing program 5: poll(&(0x7f0000000100)=[{}, {}], 0x200000000000001f, 0x0) 02:58:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000006840), 0xc, &(0x7f0000006800)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000006900070f000000000000000007000000", @ANYRES32, @ANYBLOB="00b20a000a000200aaaaaaaaaaaa0400"], 0xec}}, 0x0) [ 801.005641][T26430] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:30 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x2c91e0c9, 0x209e20, 0x8000000001, 0x40}, 0x3c) 02:58:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9}) 02:58:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:30 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0xaf01, 0x0) 02:58:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x458e}) 02:58:30 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) 02:58:33 executing program 0: socket$isdn_base(0x22, 0x3, 0x0) 02:58:33 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001580)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r0, 0x0, 0x390) 02:58:33 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0xc) 02:58:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x900) 02:58:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) 02:58:33 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) 02:58:33 executing program 1: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) 02:58:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x900) 02:58:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) 02:58:33 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x174) write$P9_RRENAMEAT(r0, &(0x7f0000000140)={0x7, 0x4b, 0x1}, 0x7) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x16) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000200)=0x80) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x1100082) getpid() getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000ac0)=""/4096, &(0x7f0000000180)=0x1000) ioctl$FICLONE(r2, 0x40049409, r2) r3 = semget(0x0, 0x0, 0xa0) semctl$SETVAL(r3, 0x3, 0x10, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r4, &(0x7f0000000a80)=[{&(0x7f00000000c0)="a4", 0x1}], 0x1) ioctl$RTC_IRQP_SET(r1, 0x4004700c, 0x2000000000004) 02:58:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 02:58:33 executing program 4: read$FUSE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x140, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000080)={@empty, @broadcast, [{[], {0x8100, 0xc000000000000000, 0x0, 0x1}}], {@ipv4={0x800, {{0x6, 0x4, 0x6, 0xfff, 0x7c, 0x64, 0x9, 0x8, 0x89, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x23}, {[@noop]}}, @udp={0x4e22, 0x4e22, 0x64, 0x0, [@guehdr={0x1, 0x4, 0x3, 0x20, 0x100}, @guehdr={0x2, 0x7ff, 0x8, 0x1, 0x100, [0x80]}, @guehdr={0x1, 0x100000001, 0xb5, 0x0, 0x100}, @guehdr={0x1, 0x5, 0x0, 0x0, 0x100}, @guehdr={0x1, 0x1, 0x2, 0x0, 0x100}, @guehdr={0x1, 0xce, 0x7, 0x2}, @guehdr={0x2, 0x5, 0x5, 0x800, 0x100, [0x80]}], "5ea4a1f9472a1820befd6d99cac5eab0580504f1fa66b8194ea5e0633a4cafa795970a770fd5a9ae7e4600f105c0da9ac979f8ffb3577339"}}}}}, &(0x7f0000000140)={0x0, 0x0, [0x9f1, 0x641, 0xd15]}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20080, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000040)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000180)={r1, 0x0, 0x1000000000000, 0x10000}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYBLOB="7f454c460005050100800000000000000000060001000000bb0200000000000040000000000000007a02000000000000fbffffff070038000200ffff0300000007000060070000000000000000000000400000000000000000800000000000000800000000000000c1ffffffffffffff8dd10000000000000000006001000000070000000000000000020000000000000200000000000000ff0100000000000000010000000000000000000000000000b4e6f6f9b58f0c0750720fa985db7e8765dd3d34075f8c7475f9d47b0900"/564], 0x234) syz_emit_ethernet(0x1, &(0x7f0000001cc0)=ANY=[@ANYBLOB], 0x0) 02:58:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x900) 02:58:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000340)='attr/fscre\xe1\x80\x01\x04\x1f+\x92\x04e\xcc\xbdC\x99\xf4g\xc0\xb4RG\xeb=B\x01h\x9d\xe3\x02\x94\xc6\xbc\x10.\xc9\xc1f\xb6\xf6\xb8\vL/9\xa3f\x92Ddk(\xd6\xeeAI\x93\x91\x0f\xd5\xf9cj\x14\x85\b\xec\xb5\xbe-\xd4\xf3\xc5\x84\xb18kKoGuDu\xcc\xb17\x1b\xb0\x98L_|4c\x96P\xb2\xe5b@\xec@[\'9*\xd3\xcbw\x16\x93\xb2\x8e\x8a\'\xb2\x89|\xda\x05l\xbd#\xdd\xde\xf1\x8f;<\xe3$\xcd\x9f\xbbX\xda\x1f\xbdm\xd1\x04\xa4\xecQ\x98\b\xee\xd9T\fAf\xc8\xa0H\xdc\xcb\x14\x8a\xa2z\x84\xb1\xd3\x80\xdf\xbe\xc2\x93oT+\xf4\xdd\x03\xfcs\x11\xab0\xfeMd\xb8\xd9\xb1{\xbck\xbf \x8c\xf3)[\xccOh\xaf\xa6\xb1\xfc\x82\x9e$5\x86\x82\xd0|\xc2\xd4\xd3\xb6Z\xe6\xc3\x15\xacus\xfeI,\xdd\f\xa3\x9a\x12\xc5U\xd8\xd0&\xd5\x9fo\xb5\x8a\xf9[\x85D\xa8\xcf\xca\x8d\xa7\xf0x.w\xacTwT\xe9\xd8\xf2\x10\x02\x91\xf3\xf9I\x94|\xbaq\xcc\xe7\xe8\x9e\n\xf1\b\x88\xf0J\x10\xea\x98\xcc\x12-\xbf\xcdMS\\\xb5ca\xae\x81\x8fp|Z\xcea\x87C\xb7lx\xd8Q\xbe\x1c8\xb4`\xde>\x9b\xdab\xbf\xcf&\xb17\xeb\x8ar !ua\xd1\x15\xa3-:\v\x05\r\xc9\xc3\x18\xac;sQ\x97\x83\xd1c^\xbc\xe2S_') 02:58:34 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x174) write$P9_RRENAMEAT(r0, &(0x7f0000000140)={0x7, 0x4b, 0x1}, 0x7) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x16) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000200)=0x80) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x1100082) getpid() getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000ac0)=""/4096, &(0x7f0000000180)=0x1000) ioctl$FICLONE(r2, 0x40049409, r2) r3 = semget(0x0, 0x0, 0xa0) semctl$SETVAL(r3, 0x3, 0x10, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) writev(r4, &(0x7f0000000a80)=[{&(0x7f00000000c0)="a4", 0x1}], 0x1) ioctl$RTC_IRQP_SET(r1, 0x4004700c, 0x2000000000004) 02:58:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x900) 02:58:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x2, 0x73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 02:58:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:34 executing program 3: syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x8084) pipe(0x0) getuid() ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000740)=""/213) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={@empty, 0x56}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e70e) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000008c0)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x84) fchdir(r0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10800000}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x24, r1, 0x0, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x6}}}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x135ba16950c89977) fcntl$setstatus(r3, 0x4, 0x46800) write$FUSE_INIT(r2, &(0x7f0000000000)={0x50}, 0x50) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) 02:58:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x480006) r1 = open(0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) fcntl$setlease(r1, 0x400, 0x0) socket$rxrpc(0x21, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) clock_gettime(0xcddad9a0106f5d9f, &(0x7f0000000280)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bond_slave_0\x00', 0x0}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80, 0x400000) r6 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@empty, 0x4e21, 0x0, 0x4e23, 0x100000000, 0xa, 0xa0, 0x20, 0x32, r4, r6}, {0x5, 0x6, 0x1, 0x10001, 0x6, 0x8, 0x4, 0x18}, {0x8000, 0x7fff, 0x100000000, 0x3f}, 0x5, 0x6e6bbf, 0x2, 0x1, 0x2, 0x3}, {{@in=@loopback, 0x4d6, 0x6c}, 0xa, @in6=@remote, 0x34ff, 0x0, 0x3, 0x3, 0x1f, 0x9, 0x4}}, 0xe8) timer_create(0x0, 0x0, 0x0) clock_gettime(0x7, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000002c0)=""/228, &(0x7f00000001c0)=0xe4) unshare(0x40000000) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000200)={r2, 0x5, 0x0, r2}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2) 02:58:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) [ 805.845823][T26533] IPVS: ftp: loaded support on port[0] = 21 [ 806.790912][T26543] IPVS: ftp: loaded support on port[0] = 21 02:58:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000001000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r1, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r1, &(0x7f0000000140)={0x0, 0x3a, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1450}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 02:58:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:35 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYRESOCT, @ANYRES32, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101e4f8d1b12b", @ANYRESHEX], 0x0, 0xc7}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0xa5}], 0x1) [ 806.968831][T26548] ptrace attach of "/root/syz-executor.3"[26546] was attempted by "/root/syz-executor.3"[26548] 02:58:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') write$P9_RUNLINKAT(r0, &(0x7f0000000080)={0x3a, 0x4d, 0xa00}, 0x7) 02:58:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x480006) r1 = open(0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) fcntl$setlease(r1, 0x400, 0x0) socket$rxrpc(0x21, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) clock_gettime(0xcddad9a0106f5d9f, &(0x7f0000000280)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bond_slave_0\x00', 0x0}) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80, 0x400000) r6 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@empty, 0x4e21, 0x0, 0x4e23, 0x100000000, 0xa, 0xa0, 0x20, 0x32, r4, r6}, {0x5, 0x6, 0x1, 0x10001, 0x6, 0x8, 0x4, 0x18}, {0x8000, 0x7fff, 0x100000000, 0x3f}, 0x5, 0x6e6bbf, 0x2, 0x1, 0x2, 0x3}, {{@in=@loopback, 0x4d6, 0x6c}, 0xa, @in6=@remote, 0x34ff, 0x0, 0x3, 0x3, 0x1f, 0x9, 0x4}}, 0xe8) timer_create(0x0, 0x0, 0x0) clock_gettime(0x7, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f00000002c0)=""/228, &(0x7f00000001c0)=0xe4) unshare(0x40000000) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000200)={r2, 0x5, 0x0, r2}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2) 02:58:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:36 executing program 4: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sched_yield() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x1, 0x0, "7bc9bd22df6e63d38c6ee820a90ab67a"}, 0x15, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="16e6bd266f000001000000"], 0xb) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:58:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="eabe9f303b222957eecb"], 0x0, 0xa}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 807.570700][T26584] ptrace attach of "/root/syz-executor.3"[26583] was attempted by "/root/syz-executor.3"[26584] 02:58:37 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x402c4580, 0x0) 02:58:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:37 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x202, 0x0) pwritev(r0, &(0x7f0000001540)=[{&(0x7f0000000300)="9e", 0x1}], 0x1, 0x0) 02:58:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:37 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x40) r1 = dup2(r0, r0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={0x0}}, 0x0) 02:58:37 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="24000000110007031dfffd940101830020200a000900000006000000000000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) [ 808.211518][T26602] input: syz0 as /devices/virtual/input/input122 [ 808.362083][T26612] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 02:58:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, &(0x7f0000000500)) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x68000, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r4 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x5e0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:58:38 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x7400000000000000, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000080)={0x81, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 02:58:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:38 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:38 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getpgid(0xffffffffffffffff) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) bind(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x1, 0x4, 0x1, {0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}}}, 0x80) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 02:58:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000440)="ba1d0a1af0b0d57d333636df916d3e77fc6e1000040000cd4c079ac70870c69a629476a614515d8ffd5d69ba61613964f8b759f811ed95b639aac3cf9b420e3e75a3c15d1ded01b0c1d15522c4628c810707", 0x52, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getpgid(0xffffffffffffffff) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) bind(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x1, 0x4, 0x1, {0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}}}, 0x80) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 02:58:38 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, 0x0) 02:58:39 executing program 0: semop(0x0, &(0x7f00000000c0)=[{0x0, 0x6}], 0x1) 02:58:39 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:39 executing program 4: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x10000101) 02:58:39 executing program 0: getrandom(&(0x7f0000000280)=""/117, 0x75, 0x3) 02:58:39 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101"], 0x0, 0xb3}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:40 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/164, 0xa4}], 0x1, 0x0) 02:58:40 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:40 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:'}, 0xffffff5c, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load default user:'], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 02:58:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) r1 = memfd_create(&(0x7f0000000440)='\x00\x81\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 02:58:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) 02:58:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 02:58:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, 0x0) [ 811.153006][T26704] encrypted_key: keylen parameter is missing 02:58:40 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') 02:58:40 executing program 2: r0 = socket$kcm(0xa, 0x0, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) [ 811.253914][T26704] encrypted_key: keylen parameter is missing 02:58:40 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) 02:58:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) r1 = memfd_create(&(0x7f0000000440)='\x00\x81\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 02:58:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) 02:58:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) r1 = memfd_create(&(0x7f0000000440)='\x00\x81\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 02:58:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRES32], 0x793a8d20) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)) 02:58:40 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e3980900b61a0bf7a301ffe8d302ab2156da58a5d1ab066f24351", @ANYBLOB="e6c55c6601000000010000009b3d72748d52864e01000000002ee70a67757310554a9ca66864eef1c8c72bdc354f15bdd0cec321957080d19ce4d725f38b6c78"], 0x0, 0x86}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:41 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) [ 811.985528][T26750] ptrace attach of "/root/syz-executor.3"[26746] was attempted by "/root/syz-executor.3"[26750] 02:58:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000440)="ba1d0a1af0b0d57d333636df916d3e77fc6e1000040000cd4c079ac70870c69a629476a614515d8ffd5d69ba61613964f8b759f811ed95b639aac3cf9b420e3e75a3c15d1ded01b0c1d15522c4628c810707", 0x52, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) getpgid(0xffffffffffffffff) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) bind(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4, 0x0, {0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}}}, 0x80) recvmsg(r0, 0x0, 0x100) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 02:58:41 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x72, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) dup2(r0, r0) 02:58:41 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 02:58:41 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) [ 812.383993][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.391609][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.399327][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.406991][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.414694][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.422441][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 02:58:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, 0x0) [ 812.430073][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.437750][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.445414][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.453079][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 812.460796][T12409] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 02:58:41 executing program 3: r0 = socket(0x2000000000000022, 0x2, 0x10000000000002) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, &(0x7f0000000080)) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000140)) 02:58:41 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:41 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 812.746972][T12409] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 02:58:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$kcm(0x2b, 0x8000000000001, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'batadv0\x00\x80\x01\xa0\xff\xff\xff\xff\x00', @random="01003a0c0b10"}) 02:58:42 executing program 3: socket$inet(0x10, 0x0, 0xc) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000000c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'veth1_to_bond\x00'}, 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2c) fcntl$setstatus(r0, 0x4, 0x80000000002c00) sendmsg(0xffffffffffffffff, 0x0, 0x0) 02:58:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, 0x0, 0x0) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$rxrpc(0x21, 0x2, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @local}, 0x1c) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:42 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') read(r0, 0x0, 0x0) 02:58:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, 0x0, 0x0) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x72, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) getpgid(0x0) setpgid(0x0, 0x0) 02:58:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x200000000000004) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="480000001400190d09004beafd0d8c562c8447000bffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000ffffff", 0x48}], 0x1) 02:58:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e3980900b61a0bf7a301ffe8d302ab2156da58a5d1ab066"], 0x0, 0x43}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 02:58:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, 0x0, 0x0) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:42 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="24000000110007031dfffd940101830020200a000900000006000000000000000d00ff7e", 0x24}], 0x1}, 0x0) 02:58:42 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ppoll(&(0x7f0000001800)=[{r0}], 0x1, &(0x7f0000001840)={0x0, 0x1c9c380}, 0x0, 0x0) [ 813.753563][T26842] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 02:58:42 executing program 3: syz_emit_ethernet(0xf2, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x7, 0xffffff21, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 02:58:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:42 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x7, r0, 0x0, 0x20) [ 813.948568][T26853] ptrace attach of "/root/syz-executor.0"[26845] was attempted by "/root/syz-executor.0"[26853] [ 814.089665][T26858] ptrace attach of "/root/syz-executor.1"[26857] was attempted by "/root/syz-executor.1"[26858] 02:58:43 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000340)) 02:58:43 executing program 5: syz_open_pts(0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 02:58:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) bind(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x80) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 02:58:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcf") inotify_init1(0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000100), 0x4) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) bind(r0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a0661040100000000cc0800000200000000000040000000000000000c02000000000000a6227c00030038000200ffffffff468d51e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f00000000000006000000000000da3d00000800000000000005000000020000006f00000003135ceb079263cc3fb262ec9aefc87b321c051c918dc843889e6b129d83"], 0xab) 02:58:43 executing program 1: getresgid(&(0x7f0000000000), &(0x7f0000001100), &(0x7f00000011c0)) 02:58:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 02:58:43 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getpgid(0xffffffffffffffff) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 02:58:43 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYBLOB="e6c55c669eb82eec51"], 0x0, 0x1b}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="24000000200007031dfffd940101830020200a000900000006000000000000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 02:58:43 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000580)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 02:58:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, 0x0, 0x0) 02:58:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000007180)=[{{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001600)=""/63, 0x3f}, {&(0x7f00000016c0)=""/140, 0x8c}], 0x2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) [ 814.893509][T26903] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:58:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000440), 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYPTR], 0xf75) 02:58:44 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYBLOB="e6c55c669eb82eec51"], 0x0, 0x1b}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:58:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, 0x0, 0x0) 02:58:44 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) gettid() 02:58:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) [ 815.328141][T26925] ptrace attach of "/root/syz-executor.4"[26924] was attempted by "/root/syz-executor.4"[26925] 02:58:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, 0x0, 0x0) 02:58:44 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0x74]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000080)={0x81, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 02:58:44 executing program 4: prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f00000004c0)={@broadcast, @multicast1, @broadcast}, &(0x7f0000000500)=0xc) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x68000, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r4 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x5e0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:58:44 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) tgkill(0x0, 0x0, 0x0) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10, 0x0, 0x10000101) 02:58:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) 02:58:44 executing program 4: 02:58:45 executing program 5: 02:58:45 executing program 0: 02:58:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) 02:58:45 executing program 4: 02:58:45 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0x74]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000080)={0x81, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 02:58:45 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, &(0x7f00000000c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 02:58:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) 02:58:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x400000000008c00, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8}) 02:58:45 executing program 5: 02:58:45 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6, 0x74]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000080)={0x81, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 02:58:46 executing program 4: 02:58:46 executing program 2: 02:58:46 executing program 5: 02:58:46 executing program 1: 02:58:46 executing program 5: 02:58:46 executing program 2: 02:58:46 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:46 executing program 5: 02:58:46 executing program 4: 02:58:46 executing program 0: 02:58:46 executing program 1: 02:58:46 executing program 2: 02:58:46 executing program 4: 02:58:46 executing program 5: 02:58:47 executing program 2: 02:58:47 executing program 1: 02:58:47 executing program 0: 02:58:47 executing program 4: 02:58:47 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:47 executing program 5: 02:58:47 executing program 1: 02:58:47 executing program 0: 02:58:47 executing program 2: 02:58:47 executing program 4: 02:58:47 executing program 1: 02:58:47 executing program 4: 02:58:47 executing program 5: 02:58:47 executing program 2: 02:58:47 executing program 0: 02:58:48 executing program 5: 02:58:48 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:48 executing program 4: 02:58:48 executing program 1: 02:58:48 executing program 2: 02:58:48 executing program 0: 02:58:48 executing program 5: 02:58:48 executing program 2: 02:58:48 executing program 0: 02:58:48 executing program 5: 02:58:48 executing program 4: 02:58:48 executing program 1: 02:58:49 executing program 0: 02:58:49 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:49 executing program 2: 02:58:49 executing program 5: 02:58:49 executing program 1: 02:58:49 executing program 4: 02:58:49 executing program 0: 02:58:49 executing program 5: 02:58:49 executing program 2: 02:58:49 executing program 0: 02:58:49 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x404e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0), 0x20) 02:58:49 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000001280)={0x0, 0x4000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000001240)) clone(0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 02:58:49 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 02:58:50 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000500)=@srh, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) 02:58:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:50 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc1105511, &(0x7f00000000c0)=ANY=[]) 02:58:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0c630000f821ff6293c4de6857e14c057a4adc33bd5c773c93544dcc0618a7d259eaf9d3c0c59db277dab06d9997d0e6536b3c0de6341d41f7403d93d8e071c92fe4db438486"], 0x1, 0x0, &(0x7f0000000200)="86"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01634040"], 0x0, 0x0, 0x0}) 02:58:50 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000600)=""/88, 0x58}, {0x0}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ftruncate(r2, 0x2081fc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000280)=0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) pipe(&(0x7f0000000300)) pipe(&(0x7f0000001a00)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=@gcm_256={{}, "5b2829fa8a0eb7ad", "cf1a93652df843b0c7592cc5faf9c4d67c9e73c19d3cdbacc36006eb5970b51c", 'Dc\aB', "577d48783fbce8cd"}, 0x38) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x4) [ 821.413888][T27126] debugfs: File '27125' in directory 'proc' already present! 02:58:50 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x0, @multicast2, 0x4e24, 0x0, 'rr\x00', 0x10, 0x0, 0x76}, 0x2c) r1 = epoll_create1(0x80000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(0x0) r4 = gettid() fcntl$lock(r0, 0x26, &(0x7f0000000480)={0x2, 0x3, 0x8000, 0x33, r4}) write(r3, &(0x7f00000001c0), 0xffffffe0) read(r2, &(0x7f0000000200)=""/250, 0xfffffffffffffef6) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x3, 0x4) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) close(r5) getsockname(r3, 0x0, &(0x7f0000000380)=0x216) r6 = socket$netlink(0x10, 0x3, 0xa) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r7, 0x200005) sendfile(r5, r7, 0x0, 0x8000ffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r6, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x68, r8, 0x8, 0x70bd28, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x9, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x44800}, 0x45) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0xec38ed91f9c7494a}) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) finit_module(r0, &(0x7f0000000180)='em0-\x00', 0x7) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000540)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff2000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0, 0x0, r5}, 0x68) 02:58:50 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x13) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:58:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:50 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) [ 822.206469][T27139] debugfs: File '27125' in directory 'proc' already present! 02:58:51 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) close(r0) 02:58:51 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r1 = gettid() fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r1, 0x6) 02:58:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) close(r0) 02:58:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000140)=[{r0}, {}, {}, {r0}], 0x4, 0x8020000000047) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x104, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x7760cef5, 0x40042, 0x0, 0x800e00510) shutdown(r1, 0x0) [ 822.676461][T27154] cgroup: fork rejected by pids controller in /syz1 02:58:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) close(r0) 02:58:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000021000500d25a80648c63940d0700fc00100002400200a06d053582c137153e37090018cb6b0a16d1da1d", 0x2e}], 0x1}, 0x0) 02:58:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/152, 0x98}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = dup2(r1, r0) setsockopt$sock_timeval(r2, 0xffff, 0x1006, &(0x7f0000000140)={0x1000}, 0x10) semop(0x0, 0x0, 0x67) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x0, 0x0, 0x800e00521) shutdown(r2, 0x0) 02:58:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:53 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:53 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:53 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="4c000000120081f87059ae08060c04000200eb10100103fe054e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a0200000046314461e6ffffffffffffff0201c50b182bbe1056", 0x4c}], 0x1}, 0x0) 02:58:53 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x2, 0x3, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) 02:58:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) close(r2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) 02:58:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x40002d1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x72) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x800) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) r2 = getpgid(0x0) sched_setattr(r2, &(0x7f00000001c0)={0x30, 0x6, 0x0, 0x0, 0x9, 0x0, 0x7fffffff, 0xffff}, 0x0) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x10000, 0x0) 02:58:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r0, &(0x7f0000008a80), 0x40002d1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x72) write$P9_RCLUNK(r2, &(0x7f0000000340)={0x7, 0x79, 0x1}, 0x7) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) 02:58:54 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setaffinity(0x0, 0xb1175c92647d5715, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) 02:58:54 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(0xffffffffffffffff) 02:58:54 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(0xffffffffffffffff) 02:58:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) syz_genetlink_get_family_id$tipc(0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r2, 0x409, 0x8) 02:58:54 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000000c0)={0x1, 0x1}) 02:58:54 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:54 executing program 0: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(0xffffffffffffffff) 02:58:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="11dca50d5e0bcfe47bf070") ioperm(0x0, 0xb037, 0x7) 02:58:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001240)={'team_slave_1\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf002}, 0x334, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001c000729d50000000000000007000000", @ANYRES32=r2, @ANYBLOB="700f00000a000200aaaaaaaaaa0c000001000000"], 0x42e}}, 0x0) 02:58:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x60000004) read$FUSE(r0, &(0x7f0000000580), 0x1000) inotify_rm_watch(r0, r1) 02:58:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='fd\x00') readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000025c0)=""/57, 0x39) 02:58:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) syz_genetlink_get_family_id$tipc(0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) r2 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r2, 0x409, 0x8) 02:58:56 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:58:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:56 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2020000000206000000a843093926ff030000080004000c0816000b770000a3c728f1c46b7b31afdc1338c544", 0x38}], 0x1}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="380000001e"], 0x1}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000000c0)}], 0x492492492492617, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:58:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf002}, 0x334, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="280000001c000729d50000000000000007000000", @ANYRES32=r2, @ANYBLOB="700f00000a000200aaaaaaaa4f7c000000000000f5182c0f5c791f3c4bc9da5750cb7a57dc35a0b3f3f227212d30c422f660c998565d9320fbdad5dac56b5e610dd255a656dc844b925e98e14debd1c8a0297623e0322944108093d3aa057270748c451088dd4ae64add7b0d14e0a9970fbb6c87945ec9cdd960ac326c39810c81b0d4165a99900b31"], 0x42e}}, 0x0) 02:58:56 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 826.998995][T27415] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 827.060675][T27424] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000000680)=ANY=[@ANYBLOB], 0x1}}, 0x1) close(r1) accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) 02:58:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) [ 827.824745][T27424] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:56 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 827.895780][T27446] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 02:58:57 executing program 2: 02:58:57 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) 02:58:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:57 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="5371cf89064500001c"], 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind(r0, &(0x7f0000000180)=@in={0x2, 0x0, @remote}, 0x80) r1 = socket$kcm(0x2, 0x1000000000002, 0x73) connect$rds(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 02:58:57 executing program 5: 02:58:57 executing program 2: 02:58:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) connect(r0, 0x0, 0x0) close(r0) 02:58:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000440)={&(0x7f00000004c0)={0x28, 0x2d, 0x1, 0x0, 0x0, {0x2}, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffff7f00000000}}]}, 0x28}}, 0x0) 02:58:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) socket$kcm(0x10, 0x3, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000140), 0x12) 02:58:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) connect(r0, 0x0, 0x0) close(r0) 02:58:58 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:58:58 executing program 4: 02:58:58 executing program 2: 02:58:58 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) 02:58:58 executing program 5: 02:58:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) connect(r0, 0x0, 0x0) close(r0) 02:58:58 executing program 4: 02:58:58 executing program 5: 02:58:58 executing program 2: 02:58:58 executing program 4: 02:58:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:58 executing program 5: 02:58:59 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(0xffffffffffffffff, &(0x7f0000002780)=""/4096, 0x112c) 02:58:59 executing program 4: 02:58:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:59 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) 02:58:59 executing program 5: 02:58:59 executing program 2: 02:58:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00'}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) close(r0) 02:58:59 executing program 4: 02:58:59 executing program 5: 02:58:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(0xffffffffffffffff) 02:58:59 executing program 4: 02:58:59 executing program 2: 02:58:59 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(0xffffffffffffffff, &(0x7f0000002780)=""/4096, 0x112c) 02:58:59 executing program 5: 02:58:59 executing program 4: 02:59:00 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:00 executing program 2: 02:59:00 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(0xffffffffffffffff) 02:59:00 executing program 4: 02:59:00 executing program 5: 02:59:00 executing program 4: 02:59:00 executing program 5: 02:59:00 executing program 2: 02:59:00 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:00 executing program 4: 02:59:00 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:00 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000080)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) close(0xffffffffffffffff) 02:59:00 executing program 5: 02:59:00 executing program 2: 02:59:00 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(0xffffffffffffffff, &(0x7f0000002780)=""/4096, 0x112c) 02:59:01 executing program 5: 02:59:01 executing program 4: 02:59:01 executing program 1: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:01 executing program 2: 02:59:01 executing program 0: 02:59:01 executing program 5: 02:59:01 executing program 1: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:01 executing program 2: 02:59:01 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:01 executing program 4: 02:59:01 executing program 5: 02:59:01 executing program 0: 02:59:01 executing program 5: 02:59:01 executing program 0: 02:59:02 executing program 1: write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:02 executing program 4: 02:59:02 executing program 2: 02:59:02 executing program 0: 02:59:02 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:02 executing program 4: 02:59:02 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:02 executing program 5: 02:59:02 executing program 2: 02:59:02 executing program 0: 02:59:02 executing program 4: 02:59:02 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:02 executing program 2: 02:59:02 executing program 5: 02:59:02 executing program 4: 02:59:02 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:02 executing program 0: 02:59:03 executing program 5: 02:59:03 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:03 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:03 executing program 2: 02:59:03 executing program 0: 02:59:03 executing program 4: 02:59:03 executing program 5: 02:59:03 executing program 2: 02:59:03 executing program 0: 02:59:03 executing program 4: 02:59:03 executing program 5: 02:59:03 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:04 executing program 4: 02:59:04 executing program 2: 02:59:04 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:04 executing program 5: 02:59:04 executing program 0: 02:59:04 executing program 4: 02:59:04 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:04 executing program 2: 02:59:04 executing program 4: 02:59:04 executing program 0: 02:59:04 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:04 executing program 5: 02:59:04 executing program 2: 02:59:04 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:05 executing program 4: 02:59:05 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:05 executing program 5: 02:59:05 executing program 0: 02:59:05 executing program 2: 02:59:05 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:05 executing program 4: 02:59:05 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:05 executing program 2: 02:59:05 executing program 0: 02:59:05 executing program 4: 02:59:05 executing program 5: 02:59:05 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:05 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:05 executing program 2: 02:59:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x20a, 0x200000000000000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000440)) 02:59:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, 0x0) 02:59:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='projid_map\x00\xfe\xff;\xad\a\xab\x97\xf1\xa74+\xc9\x98\xe3\xe9\xc3O\x16t\xbb\x1fM\x1c\xa2W\x8co\xde\xe8\xad\x8as\x16\"\xf1\x02/\xbe\'\xd2\xdb\x8c\x96\xc9\xcd\x8f\xf8\xaa3\xa4\xa7\xb5\xc9\'\xd7\xbb\x8a3\xc9P\x1f\xc4\xec\x83\xcb9\x11a\x05\xc9\x96\xd1a\x97u\xceK\xb4\x98\b9\xc9\xcb\xa1\xdfl\x87fj\x80\xdcx\xce\x12Kjl^\xff\xe6\x88LK\xb0\xe6\xd4N\xdb<.\x00\x13VaW3 t\xa0\x89\x90\xeb\x98\xd8\x98^\xb9\xda\xf5\xd5\x1eOp\a\x84\xe2\xf2\xdbt\xec\x9d\xe5\b\x81B\v\xf8\xb4x:8\xa9\xcf\x98') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/8, 0x8}], 0x1, 0x0) 02:59:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x20a, 0x0) 02:59:06 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') sendfile(r1, r2, 0x0, 0x40000523) 02:59:06 executing program 5: name_to_handle_at(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8a9f09001747d87b) 02:59:06 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x106}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:59:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x106}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 02:59:06 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:06 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='uid_map\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) 02:59:07 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="e6c55c669eb82eec51010001"], 0x0, 0x10}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:07 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a74620100"], 0x0, 0x1a}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:07 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x3) [ 838.064115][T27806] ptrace attach of "/root/syz-executor.2"[27804] was attempted by "/root/syz-executor.2"[27806] 02:59:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) 02:59:07 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)) r1 = epoll_create1(0x0) dup3(r0, r1, 0x0) [ 838.315792][T27818] ptrace attach of "/root/syz-executor.4"[27817] was attempted by "/root/syz-executor.4"[27818] 02:59:07 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:07 executing program 4: clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x8) ptrace$cont(0x18, r0, 0x0, 0x1f) 02:59:07 executing program 0: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 02:59:07 executing program 5: pipe(&(0x7f0000000a40)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000600)=""/88, 0x58}, {&(0x7f0000000740)=""/218, 0xda}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ftruncate(r3, 0x2081fc) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40046602, &(0x7f0000000280)=0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000500)={0x7}, 0x4) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0xfffffe2d) pipe(&(0x7f0000000300)) pipe(&(0x7f0000001a00)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 02:59:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) 02:59:08 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:08 executing program 4: pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000600)=""/88, 0x58}, {0x0}, {&(0x7f0000000840)=""/189, 0xbd}], 0x4, 0x0) ftruncate(r4, 0x2081fc) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000280)=0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000500)={0x7}, 0x4) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0xfffffe2d) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 02:59:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) 02:59:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) lsetxattr$security_selinux(0x0, &(0x7f0000000180)='security.selinux\x00', 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 02:59:08 executing program 0: syz_emit_ethernet(0x2a, &(0x7f00000010c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) 02:59:08 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) renameat(r0, 0x0, 0xffffffffffffffff, 0x0) 02:59:08 executing program 4: mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x1, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) modify_ldt$read_default(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)={0x0, 0xfb, 0x15, 0x1, 0x3f, "7bc9bd22df6e63d38c6ee820a90ab67a"}, 0x15, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) write$P9_RWALK(r4, &(0x7f0000000640)={0x57, 0x6f, 0x80000000000000, {0x6, [{}, {0x4, 0x1, 0x3}, {0x82}, {0x0, 0x3}, {}, {0x2}]}}, 0x57) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) r5 = dup2(r1, r3) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000580)=0x0) rt_tgsigqueueinfo(0x0, r6, 0x21, &(0x7f00000005c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:59:08 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/19, 0x79e2494) read(r0, &(0x7f0000002780)=""/4096, 0x112c) 02:59:08 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sched_setaffinity(0x0, 0x1, &(0x7f0000000540)=0x5) ioctl$KDSKBMODE(r1, 0x4b45, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(r3, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{@in=@initdev}, 0x0, @in6=@remote}}, 0x0) getegid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), 0x0) getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000880)) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000940)) getegid() ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@remote, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000008ec0)={{{@in6=@ipv4={[], [], @remote}}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000009000), 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r2, r4, 0x0, 0xfffc) dup2(0xffffffffffffffff, 0xffffffffffffffff) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000300), 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:59:08 executing program 5: mlockall(0x400000003) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 02:59:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:audisp_remote_exec_t:s0\x00', 0x2a, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 02:59:09 executing program 4: poll(&(0x7f0000000180), 0x200000000000021b, 0x49) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000000)=""/89, 0x59}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) shutdown(r1, 0x0) 02:59:09 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:09 executing program 5: poll(&(0x7f0000000180), 0x200000000000021b, 0x49) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffe2, 0x0, 0x0, 0x800e00509) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x10025, 0x2, 0x0, 0x800e00505) shutdown(r1, 0x0) 02:59:09 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/19, 0x79e2494) read(r0, &(0x7f0000002780)=""/4096, 0x112c) 02:59:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/152, 0x98}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = dup2(r1, r0) dup2(r2, r1) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r2, 0x0) 02:59:09 executing program 4: poll(0x0, 0x0, 0x49) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffe2, 0x0, 0x0, 0x800e00509) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) getsockopt(r0, 0x2, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x10025, 0x2, 0x0, 0x800e00505) shutdown(r1, 0x0) 02:59:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:audisp_remote_exec_t:s0\x00', 0x2a, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 02:59:09 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/19, 0x79e2494) read(r0, &(0x7f0000002780)=""/4096, 0x112c) 02:59:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x100000000000036c}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x245, 0x0, 0x0, 0x800e00512) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/105, 0x69}, {0x0}], 0x2}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000001b40)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1) shutdown(r4, 0x0) shutdown(r1, 0x0) 02:59:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x100000000000036c}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x245, 0x0, 0x0, 0x800e00512) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/105, 0x69}], 0x1}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f00000016c0)=[{&(0x7f0000000480)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r4, 0x0) shutdown(r1, 0x0) 02:59:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:09 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000740), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x140, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20080, 0x0) ftruncate(0xffffffffffffffff, 0x10084) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x72439a6b) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYBLOB="7f454c460005050100800000000000000000060001000000bb0200000000000040000000000000007a02000000000000fbffffff070038000200ffff0300000007000060070000000000000000000000400000000000000000800000000000000800000000000000c1ffffffffffffff8dd10000000000000000006001000000070000000000000000020000000000000200000000000000ff0100000000000000010000000000000000000000000000b4e6f6f9b58f0c0750720fa985db7e8765dd3d34075f8c7475f9d47b0900"/1125], 0x465) syz_emit_ethernet(0xfdef, &(0x7f0000001cc0)={@link_local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @dev, @empty=0xac142302, @random="eb5de09d9520", @dev={0xac, 0x14, 0x14, 0xd}}}}}, 0x0) 02:59:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:audisp_remote_exec_t:s0\x00', 0x2a, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 02:59:10 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:10 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000080)={0x81, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 02:59:10 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x140, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20080, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) ftruncate(r1, 0x10084) sendfile(r0, r1, 0x0, 0x72439a6b) write$binfmt_elf64(r0, &(0x7f0000001740)=ANY=[@ANYBLOB="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"/2253], 0x8cd) ioctl(0xffffffffffffffff, 0x27, &(0x7f0000000180)="2827859ba09f93b9dc77b5eaf595c99c5a2b98310078f5dc7f64872b672e078481bfa88533c52f0ee85e5a2bf1a3ec37f725cdbf9191b55f6fe386fdbe0137ca0b955fd0cb6e2a3bfaed6359064334cc72d82459064ac6a22b94a9339085859a116b86d6301a358c4c4292888f4f2d5b71fd392950a9704b9e69a5b935be2f8d76ab036b5cb914c631128c7004dabfce291abd3523814d13ec15d048a118bc7e02f10b22685d9876fbcfb710dc4837a6d75351dc601f70bdc97d185dfd01ff5516") syz_emit_ethernet(0xfdef, &(0x7f0000001cc0)={@link_local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @dev, @empty=0xac142302, @random="eb5de09d9520", @dev={0xac, 0x14, 0x14, 0xd}}}}}, 0x0) 02:59:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) lsetxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:audisp_remote_exec_t:s0\x00', 0x2a, 0x0) sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0) 02:59:10 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:10 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000740), 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x140, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20080, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141046, 0x10) socket$bt_bnep(0x1f, 0x3, 0x4) ftruncate(r1, 0x10084) sendfile(r0, r1, 0x0, 0x72439a6b) write$binfmt_elf64(r0, &(0x7f0000001740)=ANY=[@ANYBLOB="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"/2253], 0x8cd) ioctl(0xffffffffffffffff, 0x27, &(0x7f0000000180)="2827859ba09f93b9dc77b5eaf595c99c5a2b98310078f5dc7f64872b672e078481bfa88533c52f0ee85e5a2bf1a3ec37f725cdbf9191b55f6fe386fdbe0137ca0b955fd0cb6e2a3bfaed6359064334cc72d82459064ac6a22b94a9339085859a116b86d6301a358c4c4292888f4f2d5b71fd392950a9704b9e69a5b935be2f8d76ab036b5cb914c631128c7004dabfce291abd3523814d13ec15d048a118bc7e02f10b22685d9876fbcfb710dc4837a6d75351dc601f70bdc97d185dfd01ff5516") syz_emit_ethernet(0xfdef, &(0x7f0000001cc0)={@link_local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @dev, @empty=0xac142302, @random="eb5de09d9520", @dev={0xac, 0x14, 0x14, 0xd}}}}}, 0x0) 02:59:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/22, 0x16}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) getsockopt$sock_linger(r1, 0xffff, 0x80, 0x0, &(0x7f0000000200)) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r1, 0x0) 02:59:11 executing program 5: poll(0x0, 0x0, 0x49) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffe2, 0x0, 0x0, 0x800e00509) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) getsockopt$sock_timeval(r1, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x10025, 0x2, 0x0, 0x800e00505) shutdown(r1, 0x0) 02:59:11 executing program 4: close(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) getpid() write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000280), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000080)={0x81, 0xfffffffffffffff7}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 02:59:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:11 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(r1, 0x402, 0x0) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x4, 0x8}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:11 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x4, 0x8}) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:11 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:12 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:12 executing program 5: close(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 02:59:12 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008163e00f80ecdb4cb904034865161a000800050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 02:59:12 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[], 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:12 executing program 0: r0 = socket$kcm(0xa, 0x20000000000003, 0x11) r1 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000a40)={r0, r2}) socket$kcm(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket$kcm(0x2b, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001dc0)='memory.swap.current\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r3, 0xc0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=0x6, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x2, 0x400, 0x8b47}, &(0x7f0000000840)=0x100, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000009c0)=r5, 0x4) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="006d656d6f727920bf4d70a5355d65754d80ec596fcc4015231452b0dbbd76ce9f70e373380b31138f700bc48d159b03cfc4ab59f6b6d4b322f0abff952e1ccf62e0cf2131d12c4ea9922aa3f7f61c554ce168b240e03d2f7868fa8fd298d1d07330c5fe58cc8a621f2c5ef6c8cce26cff0d4baf750cf4f9ba8c067dbd9ba4dc2c1c069b564a3dcac46b7243c428656e43669b"], 0xfdef) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 02:59:12 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0x2b, 0x200000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000001c0)="39000000140081ae00003c0005000187110008abca1b4eff030000ebb37358582bdbb7d553eb6057bad9e220085a0839b4e921556b3d5df500", 0x39}], 0x1}, 0x0) socket$kcm(0x11, 0x3, 0x0) recvmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcd9}, 0x0) 02:59:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:13 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x7, 0x1000, 0x0, 0x101, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2c, 0x0, 0x0, 0x100, 0x400, 0x970, 0x0, 0x401, 0x0, 0x0, 0x0, 0x2, 0x7, 0x100000001, 0x0, 0x40, 0x7ff, 0xb7f8, 0x8001, 0x7, 0x0, 0x3, 0xf3f8, 0x0, 0x0, 0x3ff, 0x4, @perf_config_ext={0xfffffffffffffff7, 0xffffffff}, 0x30000, 0x0, 0x0, 0x4, 0xfff}, r1, 0x0, r0, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) [ 844.182622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 844.189181][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:59:13 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008163e00f80ecdb4cb904034865161a000800050000000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x101000, 0x0) 02:59:13 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:13 executing program 2: [ 844.505696][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 844.514414][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:59:13 executing program 2: 02:59:13 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[], 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:13 executing program 5: 02:59:14 executing program 4: 02:59:14 executing program 2: 02:59:14 executing program 0: 02:59:14 executing program 5: 02:59:14 executing program 4: 02:59:14 executing program 5: 02:59:14 executing program 2: 02:59:14 executing program 0: 02:59:14 executing program 5: 02:59:14 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:15 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[], 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:15 executing program 4: 02:59:15 executing program 2: 02:59:15 executing program 0: 02:59:15 executing program 5: 02:59:15 executing program 4: 02:59:15 executing program 2: 02:59:15 executing program 5: 02:59:15 executing program 0: 02:59:15 executing program 4: 02:59:15 executing program 2: 02:59:16 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:16 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:16 executing program 5: 02:59:16 executing program 4: 02:59:16 executing program 0: 02:59:16 executing program 2: 02:59:16 executing program 2: 02:59:16 executing program 0: 02:59:16 executing program 4: 02:59:16 executing program 5: 02:59:16 executing program 0: 02:59:16 executing program 5: 02:59:17 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:17 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:17 executing program 2: 02:59:17 executing program 4: 02:59:17 executing program 0: 02:59:17 executing program 5: 02:59:17 executing program 4: 02:59:17 executing program 0: 02:59:17 executing program 2: 02:59:17 executing program 5: 02:59:17 executing program 2: 02:59:17 executing program 0: 02:59:18 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:18 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:18 executing program 4: 02:59:18 executing program 5: 02:59:18 executing program 2: 02:59:18 executing program 0: 02:59:18 executing program 4: 02:59:18 executing program 5: 02:59:18 executing program 0: 02:59:18 executing program 2: 02:59:18 executing program 5: 02:59:18 executing program 0: 02:59:19 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:19 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:19 executing program 4: 02:59:19 executing program 2: 02:59:19 executing program 0: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000002, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x17}) getsockname$packet(r1, 0x0, &(0x7f0000000280)) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x81) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) getpid() 02:59:19 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) mlockall(0x400000003) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 02:59:19 executing program 0: mlockall(0x400000003) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 02:59:19 executing program 2: syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:59:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x822102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffce2}, {0x0, 0x15e}, {0x0, 0x3ff}, {&(0x7f0000000000)=ANY=[@ANYBLOB="910fa919a3da39668898c5d0e1c3196029f7daa47f"], 0x9c}], 0x1a8, 0x0, 0xfffffffffffffe82}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x2, 0x2, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x9e0748fc92f28d84) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000500)) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) mkdir(&(0x7f0000000280)='./file0\x00', 0x100000101) truncate(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000300)=0x4) ioctl$UI_DEV_CREATE(r3, 0x5501) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xbc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) recvfrom(r2, &(0x7f0000000080)=""/110, 0x6e, 0x0, 0x0, 0x0) eventfd2(0x0, 0x80000) bind$alg(r2, 0x0, 0xffffffffffffff6a) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="776563974ae4b214fbfd8e726f7570009b64a807e25635db7a9e629cd65f1e058cb1d7631cb3ab9afa5191cb0892dcfaf2561a3c39b852c05b7131dae712292e0500000000000000d601a7e6b361036d9a7cdc2d22f94d356f1d6749dfc55749e1000000000000b9884cec8f42a2b6c46ef1dfd9bfbb437baf7bca6546d2d64cbc145f3af6c01c5192179e007d9af015768963049cec6fcbaf49b65278058af32884b9c96b58db617daa0654fe543cef39945663c93608ba7f465f9d460c1a4b6cb68e10a664ff4414a3a04f635278ad9c7fac318b0a2b08d4e5dbb4e7ed8b24c5204611ceec0c60d3512fa70d2fbf61894018f15170bcf66f6389213534557e"]) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20) syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') 02:59:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\xff\xff\x9a\x00\xa0\x00Q\xfc\x03\x00', 0x141}) 02:59:20 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:20 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:20 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000240)) 02:59:20 executing program 2: syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 02:59:20 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) [ 851.670300][T28279] vivid-000: ================= START STATUS ================= [ 851.678391][T28279] vivid-000: Radio HW Seek Mode: Bounded [ 851.684242][T28279] vivid-000: Radio Programmable HW Seek: false [ 851.690587][T28279] vivid-000: RDS Rx I/O Mode: Block I/O [ 851.696338][T28279] vivid-000: Generate RBDS Instead of RDS: false [ 851.702872][T28279] vivid-000: RDS Reception: true [ 851.707881][T28279] vivid-000: RDS Program Type: 0 inactive [ 851.713794][T28279] vivid-000: RDS PS Name: inactive [ 851.719059][T28279] vivid-000: RDS Radio Text: inactive [ 851.724706][T28279] vivid-000: RDS Traffic Announcement: false inactive [ 851.731547][T28279] vivid-000: RDS Traffic Program: false inactive [ 851.738083][T28279] vivid-000: RDS Music: false inactive [ 851.743725][T28279] vivid-000: ================== END STATUS ================== 02:59:20 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000240)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:59:20 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000240)) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 02:59:21 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 852.115411][T28259] device sit0 entered promiscuous mode 02:59:21 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x1, 0x10) creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x100000488) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 02:59:21 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 852.684990][T28281] device sit0 left promiscuous mode 02:59:22 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, 0x0, 0x0, 0x0) [ 852.960097][T28282] device sit0 entered promiscuous mode 02:59:22 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:22 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000240)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 02:59:22 executing program 2: r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 02:59:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca5055e0bcfe47bf070") ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 02:59:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20321798c481a14337b6d46eb9892153dc9449901bfe9b0700000000000000943fcb2b000000000000994e3690c53ebf10e9615a9d6800aa0f"], 0x1}}, 0x0) r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 853.581654][T28325] vivid-000: ================= START STATUS ================= [ 853.589785][T28325] vivid-000: Radio HW Seek Mode: Bounded [ 853.595690][T28325] vivid-000: Radio Programmable HW Seek: false [ 853.602108][T28325] vivid-000: RDS Rx I/O Mode: Block I/O [ 853.607720][T28325] vivid-000: Generate RBDS Instead of RDS: false [ 853.614291][T28325] vivid-000: RDS Reception: true [ 853.619302][T28325] vivid-000: RDS Program Type: 0 inactive [ 853.625247][T28325] vivid-000: RDS PS Name: inactive 02:59:22 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:22 executing program 0: r0 = socket$inet(0x2, 0x1000002000080001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x0, 0x201}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000000040)='~', 0x1}], 0x1}, 0x0) [ 853.630562][T28325] vivid-000: RDS Radio Text: inactive [ 853.636197][T28325] vivid-000: RDS Traffic Announcement: false inactive [ 853.643133][T28325] vivid-000: RDS Traffic Program: false inactive [ 853.649523][T28325] vivid-000: RDS Music: false inactive [ 853.655248][T28325] vivid-000: ================== END STATUS ================== 02:59:22 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:22 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @broadcast=0xe0000001}, 0x10) 02:59:23 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:23 executing program 2: 02:59:23 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, 0x0, 0x0, 0x0) 02:59:23 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:23 executing program 0: 02:59:23 executing program 2: 02:59:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca5055e0bcfe47bf070") ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 02:59:23 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) close(r0) 02:59:23 executing program 2: [ 854.680013][T28367] vivid-000: ================= START STATUS ================= [ 854.688012][T28367] vivid-000: Radio HW Seek Mode: Bounded [ 854.694233][T28367] vivid-000: Radio Programmable HW Seek: false [ 854.700456][T28367] vivid-000: RDS Rx I/O Mode: Block I/O [ 854.706261][T28367] vivid-000: Generate RBDS Instead of RDS: false [ 854.712796][T28367] vivid-000: RDS Reception: true [ 854.717854][T28367] vivid-000: RDS Program Type: 0 inactive [ 854.723807][T28367] vivid-000: RDS PS Name: inactive 02:59:23 executing program 0: [ 854.729099][T28367] vivid-000: RDS Radio Text: inactive [ 854.734742][T28367] vivid-000: RDS Traffic Announcement: false inactive [ 854.742836][T28367] vivid-000: RDS Traffic Program: false inactive [ 854.749234][T28367] vivid-000: RDS Music: false inactive [ 854.754879][T28367] vivid-000: ================== END STATUS ================== 02:59:24 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[]}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:24 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) close(r0) 02:59:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca5055e0bcfe47bf070") ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 02:59:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="d6f8ffffffffffff0000000000000000e309"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0xfffffffffffffffd) [ 855.295300][T28389] vivid-000: ================= START STATUS ================= [ 855.303270][T28389] vivid-000: Radio HW Seek Mode: Bounded [ 855.308981][T28389] vivid-000: Radio Programmable HW Seek: false [ 855.315467][T28389] vivid-000: RDS Rx I/O Mode: Block I/O [ 855.321114][T28389] vivid-000: Generate RBDS Instead of RDS: false [ 855.327668][T28389] vivid-000: RDS Reception: true [ 855.332740][T28389] vivid-000: RDS Program Type: 0 inactive [ 855.338520][T28389] vivid-000: RDS PS Name: inactive [ 855.343945][T28389] vivid-000: RDS Radio Text: inactive [ 855.349476][T28389] vivid-000: RDS Traffic Announcement: false inactive [ 855.356400][T28389] vivid-000: RDS Traffic Program: false inactive [ 855.362885][T28389] vivid-000: RDS Music: false inactive [ 855.368406][T28389] vivid-000: ================== END STATUS ================== 02:59:24 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, 0x0, 0x0, 0x0) 02:59:24 executing program 0: 02:59:24 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) close(r0) 02:59:24 executing program 2: 02:59:24 executing program 0: 02:59:24 executing program 2: 02:59:24 executing program 5: 02:59:24 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(0xffffffffffffffff) 02:59:25 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[]}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:25 executing program 0: 02:59:25 executing program 5: 02:59:25 executing program 2: 02:59:25 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 02:59:25 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(0xffffffffffffffff) 02:59:25 executing program 0: 02:59:25 executing program 2: 02:59:25 executing program 5: 02:59:25 executing program 5: 02:59:25 executing program 2: 02:59:25 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(0xffffffffffffffff) 02:59:26 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[]}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:26 executing program 0: 02:59:26 executing program 2: 02:59:26 executing program 5: 02:59:26 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 02:59:26 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:26 executing program 2: 02:59:26 executing program 5: 02:59:26 executing program 0: 02:59:26 executing program 2: 02:59:27 executing program 2: 02:59:27 executing program 0: 02:59:27 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:27 executing program 5: 02:59:27 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 02:59:27 executing program 2: 02:59:27 executing program 0: 02:59:27 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:27 executing program 5: 02:59:27 executing program 2: 02:59:27 executing program 2: 02:59:27 executing program 0: 02:59:27 executing program 5: 02:59:28 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:28 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:28 executing program 0: 02:59:28 executing program 2: 02:59:28 executing program 5: 02:59:28 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:28 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 02:59:28 executing program 0: 02:59:28 executing program 5: 02:59:28 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:28 executing program 2: 02:59:28 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56ad8e3980900b61a0bf7a301ffe8d302ab2156da58a5d1ab066f24351", @ANYBLOB="e6c55c6601000000010000009b3d72748d52864e01000000002ee70a67757310554a9ca66864eef1c8c72bdc354f15bdd0cec321957080d19ce4d725f38b6c78f0bebc31"], 0x0, 0x8a}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:28 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 02:59:29 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:29 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:29 executing program 2: prlimit64(0x0, 0x7, &(0x7f00000002c0), 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:59:29 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYBLOB="e6c55c669eb82eec"], 0x0, 0xc}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000500)='net/ip6_flowlabel\x00') 02:59:29 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 02:59:29 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, 0x0, 0x8000) close(r0) 02:59:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='projid_map\x00\xfe\xff;\xad\a\xab\x97\xf1\xa74+\xc9\x98\xe3\xe9\xc3O\x16t\xbb\x1fM\x1c\xa2W\x8co\xde\xe8\xad\x8as\x16\"\xf1\x02/\xbe\'\xd2\xdb\x8c\x96\xc9\xcd\x8f\xf8\xaa3\xa4\xa7\xb5\xc9\'\xd7\xbb\x8a3\xc9P\x1f\xc4\xec\x83\xcb9\x11a\x05\xc9\x96\xd1a\x97u\xceK\xb4\x98\b9\xc9\xcb\xa1\xdfl\x87fj\x80\xdcx\xce\x12Kjl^\xff\xe6\x88LK\xb0\xe6\xd4N\xdb<.\x00\x13VaW3 t\xa0\x89\x90\xeb\x98\xd8\x98^\xb9\xda\xf5\xd5\x1eOp\a\x84\xe2\xf2\xdbt\xec\x9d\xe5\b\x81B\v\xf8\xb4x:8\xa9\xcf\x98') write$P9_RWSTAT(r0, 0x0, 0x0) [ 860.515396][T28561] ptrace attach of "/root/syz-executor.5"[28556] was attempted by "/root/syz-executor.5"[28561] 02:59:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$unix(r0, 0x0, 0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)) r2 = epoll_create1(0x0) dup3(r1, r2, 0x0) 02:59:29 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="e6c55c669eb82eec510100019b3d7280437a746201000600090001000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275f"], 0x0, 0x41}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:29 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000400)) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x800, 0x46d, 0x0, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x1}}}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40) listen(r0, 0x4) setuid(0x0) wait4(0x0, &(0x7f00000000c0), 0x6000000a, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2900000003000000000000000000000001000000000000000800000000000000696f2e737461740000e2a77e2ad4485f1cb1f2eace84ae080f6dddae571e3669b1fd594626945dca9d2fb90c3105202dfd78cdb9dfc5661c480c6b411ab1b6db8477d31bd5bd7f31a25b1214e65bc7b7a0b4e580ab98005929b64cd4a033506a52e7210451b0a3739c70f2bf231b31e0132778f0400398826d869632e1b203fb8048e0c1bf5e439763511c34e544812f2cd874304e05d2e662383eef"], 0xbc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000200)) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') r5 = accept4$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14, 0x800) getsockopt$inet6_mreq(r2, 0x29, 0x3c, &(0x7f0000000740)={@mcast2}, &(0x7f0000000780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000ec0)={{{@in=@empty, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@broadcast}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000023c0)={'sit0\x00'}) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000002400)={@local}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002480)={{{@in6=@remote, @in=@empty}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000002580)=0xe8) getpeername$packet(r3, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002600)=0x14) getsockname(r4, &(0x7f0000002700)=@hci, &(0x7f0000002780)=0x80) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f00000027c0)={@remote, @broadcast}, &(0x7f0000002800)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000029c0)={'bpq0\x00'}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000002a80)={'rose0\x00'}) getsockname$packet(r1, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002b00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002b40)={@loopback}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000002bc0)={{{@in=@initdev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000002cc0)=0xe8) accept4$packet(r3, &(0x7f0000002dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002e00)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e40)={{{@in=@empty}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000002f40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000003000)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000033c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000003400)={'team0\x00'}) getpeername$packet(r2, &(0x7f0000003640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003680)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000003700)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000003800)=0xe8) getpeername$packet(r3, &(0x7f0000003840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000038c0)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f00000039c0)=0xe8) getpeername$packet(r2, &(0x7f0000003a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a40)=0x14) accept4$packet(r2, &(0x7f0000003a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003ac0)=0x14, 0x80800) getsockname(r3, &(0x7f0000003b00)=@xdp, &(0x7f0000003b80)=0x80) getsockname$packet(r2, &(0x7f00000041c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000004200)=0x1) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000004240)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000043c0)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f00000044c0)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000004500)={0x0, @empty}, &(0x7f0000004540)=0xc) accept4$packet(r3, &(0x7f0000004580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000045c0)=0x14, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004600)={{{@in=@empty}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000004700)=0xe8) sendto$inet(r4, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$ion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ion\x00', 0xa2400, 0x0) write$binfmt_script(r4, &(0x7f0000001000)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd9252689db19239e8a5606e6635ddee806b5f917ba77a9d73c005f1d65ab06dcefc57551c9d41fbc241e44552829a60768e93d001671f3effb1f1ef2ae12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e7275ab7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069c500000000000a6524126f1fdaf7dd82c4e83ecc7b60600f45e9602e1d2ea4470ece86713678f239e277019b632afc6e09aa720c7620b36940af961f0ccc0989b5d907ae86b75c3b9f26fcd4e9cdf9a941f3d3a1114b5cfa5432d36bbd84a3407c901385764a5697cbd85e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0a3134ec8b4977cdb1f95e90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cb510ffff2158bc5e7a51432573c5d5842504bd6ac17200535a53ff3b2c8f6d88eca4a2644ac91970d1ca2db0e6361a19e9606bdaa3892320d499b2a82743d51374c501d8d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e1053df88e5494f952d8fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7c56187514597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f6752cf5c30600000000000000de8ce0505e8ab69b19fa7067c68a0601eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae60800008000000000cb7889d5c14e6ed5338492f654f201817a77dadb046bace06e9eee9bea92cb87abcd83c41b2db3b45f174a7daaba729067ddb040ed96a4a533c600c8eb0042651150a50028bd8618e9f243728b129c4c0b52403edfa4ffa2aa53d4cc45703c0585a625f9e5242159275364a684460d0c076ec6e5c3b0381a10dc81c637eb157f32cdb431e829f405694750c3d616910918a51e93bfc3a7bb847709c20765c73895d94ad8747a1a1a5249e045622f5b2edd5add"], 0x3be) setsockopt$sock_int(r4, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 02:59:30 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, 0x0, 0x8000) close(r0) 02:59:30 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:30 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x13) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x3a}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x1) 02:59:30 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, 0x0, 0x8000) close(r0) 02:59:30 executing program 1: pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) write$FUSE_DIRENT(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="e5"], 0x1) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 02:59:30 executing program 0: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mknod(&(0x7f0000000400)='./file1\x00', 0xc400, 0x7) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000c80)={0x8, "5f5539ae7383df635d7eb9f00cde999ef4e1d4fbae589edcbcd64ae9781d89f20a7c347bd734db9d80a3e9ee0d0f04fe5305dacf9e656dc623d0d8abb05b81ebf7fa83533ebfe364612ee7d5571be6e3af5eccf0e26370ff66a26e95f4b7b1206b9d9a70fe612b356ec5074716b0e71eb9f60ac1c5e653c9a7de0de9a5f8c8047f77ece27201fc36e2ca04338864356e123b3b96be97afa5d6698e6f08a657f7ad07b42df05dfca83247581434b575e2d4419e52f1103e9e3ddc440a98f9caeace71f8affb3cfc62e4b428403787ff063d2923a50c0410f191c7923b77c51fea54cc7f2b8adcd2a5e1f53495c168736a160f28435b70f6e40df8523c2deaef8b70f13bc408d1d6eb05dbcae35f0c12cb00b8d589c0dda912acf9315852e1cbb85857f9421cd623fc5046448db22eec3c07358c4778c73a2495bf3452b18d8e904ed88ae250a99edb20b78fc923ccc841847a4f6d514320309afe2f0a075e50096c7a8cd4da2d88791d01a10cea10a97d32e8bb05a5e2bf52be5fffa3fb26953a0fadac598644cf0297d01d5c1ed9f2123ba789fa650b0d140a478903cc23a5b5c2a2a52f19bdd40039ac0291f648f1f991e272c52669f7843e73b3be22103fe0a88d5d405b9ecea5d602be0b5466d18d8a971b69a8e80e48621103a6bc6ee3a7b70b199005241779f22fa2cc159988eaf2d53c858ec06ab56acc232b587ffee3a5cb29f5641b2189fb1617d1a652e42511fe2e447a2636f18ceabc261126200193eb9f309f80aa204a93883bf6fb247ade866685f300295f8735e18d1d81365dbd2bddfa1779c59effed803bbe0a68302b1ab0f0d00892138ad24d52d653d92897bd28c2f031a77eae54ef3ce9a1fc44ea41763b2d780a454f68ea1a297302b4fa6664923a818040f5a74e0db3ff24e940e97d4abff40af2d36f7bceb8a0c5e90dbefbc8ba496f6e42f11ce11fb20655138f9387938abc3aa3a742f749a8695d972c537127519f654945bac96f0a2ef9d6b24f2226ae677684e3eb63041d6b5105777a8e6aa41ff11366448c0af1ddf5e3f2a1d828b4c9ede3809eab736c9035f2a7032ce38b699dfdc3e158e1ce62d325441e1b05a3ba5f663f20b0cb703cb2960aad298177881aa6b52bf4ae112c5d2bb691ac34b0723be7ddcfff0015e578475db1f062c5a50b54bbcba2f591eb4d6de66f386b0d5dd3975229ad25ae95d82266dfb9c1a6f497ef54b6ac5ee81edae16c47e89f9a435377dfac411db459559ce483921251745b8b94f69d4815b009ea86aedc5a75a516ff2afaff9a418f73c2cacbcdf45dd02ba962399f9b81e149635c2b4c0bda790a6d72fc243f6fbc73d0a0636db51c03d93b44b42c07f2269b465231f953e6a45dc549e9b5ef05443da7820cd667f5b0ff47a13f0a3df630a6f98f72e09978b829389d6a11afb0a7a0988822bb95fcb50399e51295f464662118646d2996da0fa710b082036820ae0a60828479bad4489061244b74179cfec74ab273551190c0eb2ca95be86391b8e469454796d04b29646b8aaae49889ffd84e83e33fb0cd7b10d778e72422f474911897dbd4548d9658e9af23cfff0ad4a7d750ab59e0f8988082ab7ac8d27eeab1c5809de6694aba8ee6ff1ba23d422f38dc026a77933cb0fc916d22131f7f736e35c881c5551f13a5037f65b9090372bb8e73bb9cd686715afef6b40ff275a978078c1e1c7db358285e5caee5c53cb4a7b446db91e5c0615342265edd9f09a72002aae56c7ad4269a0513569db514ee852724cdcccb72e8836fc270f7aa03e03e65f4572c2909e6fb1b557e89c3b505ba2f2b10b545513758abdbdc5b3e5ec1fe4d6bd5947b354058eccb79f10e971a85bdafa5aa27224acc734d884f9282ed033fc540defa3181d451713565d940879cd70a1d704b9a390de509351d5129bff18051b0c7ca196a78d3b8d0c8f384c79ad637b2e1770fecfc980960ef403cbc6bb284792cd169133f35aea028d9ffdc1668572dd197db86a26cb6fe1bb822bb76968ef2cd3c384704b75d0f17a50bcce054a400edd3b2f2abf72d2d8a679fdc94216d2d7d43ca1e60aeb5a313f8104f8ae54e75beb6c106cf080b9ecc9a1f91508b37d9ede25a1bede738c3a7f3501391a7b1863fe120ea26c4ff13f1de4588b150f3f2c12a9b9d92e6a8610c788c4d449a91416307a313536e1779bef88028d65a9398c5d1492b729d5f08e34e64fa07507f64297a1f9305a2d68169f653d5c107c9860ca0d822916eb357c646c229e792b1a5da56b35ab971bb82e41581e11f24f9c6b26c019dd2f2f89f2a82b74bd856ed7b46a2d9c07b2856bc39e9a28f271c5bb06db5bfa04d21e37e778b3e03071d25da8bbc91543fe8909603ba92e3455cb0edfe1dc040f12c169a97a5b8fb09f97acda29ab8491e7c9f81320b1a9de5773078557a6a0bdc5a1bfd2d953c47b3e5ccc70d76dc4ba10c297d7591e2c2150b8235de09714fedcf23aedb0ec9586e52f6af6c299256ad5a0a4ce22666be48592977dc5ff5c5eea529b81df4510016240b8fc8489bf59c899bb75481220554d0b9aebf1660cb72b01dfc3ffaac27dc1d36247e86339c6d99fc3ca8edf585fdb236ecdffda1b99819f873367ee5d8fde5d596517f895c9154deab01ca26008edbeadecfe33cae750ff044469a1b3b104b35af0c04a35a48aecf54dd8844b598432b81f67ce232ad46a247cad103274cd7c206d890008b149aaa3310f9794243cc5e04d4bd3e66a5b01ef67044412eba507a20399856cd26fb6233ebc064aa7b5ba94198bc05301dd74d6875b6d3b4731c2a11f0656767a3e6ba0a3d6951a7f9385ff99876891b8150ac5257756ef92a6c3854ccba8f13bca3cd3e66fdc93feefc44c3eba570970e0a6921f1eef24713ed5a174b8e52a0bc1bd3b420bdd0e521835289d29267fca4512caeaf64d1adeba2457864801d30d37e4eea965f8cfdb314f62307d8a12084a65da330f800862cae3876cdffe8c77d982ce9527b069628f0d796c0ec1c1b423ab6eb248e176a9b201d4de572f7901d8d88ae3dc6c3f196a4e3fb81552f16f7a7b7b3a242824b0618a855fc150fe8d484c80b3e1ea6c42f165dcfa7b0b292f9c7f27179d32260d4f472385a8818f7d76133030cf1256153b4162c8c3a3629c01e9b8cb5a30b3d0068d7f0e3727d8159739386511746fad1cfcc98c7af05b489876432957c6d59c51f12ebb62acac90311e6b00cea58b355db5a36718dfb8140d23e64e41ef9d33969cae75ea3ef8f14ad8c9b2d0c8bd7bf4366b091b5992ffbd71800495c0484cbee4b5fffaede0808cdcfa2409227e6b96dd82481d6d00bfff72c29f860b7fa4fa9c3634d9a2e4f7a8ef240c997b749e0562514d5c2c5d66da75149dea37b1cbb347fa0df5be2b9a5ddf20a6d47936b3b55cedc64453e69413a89c8a9eaeda00fccc96281b4f29db0f3e45fa098c77ffe3c0488529ecfa801cdf7fe8a23f6a3aa04acaf4e300c44e6d873f43b9fd4b13cbed2411c97378e07c7a6799d272d36ac8964233130947ed88f727915fa58a4812ceacd6cc6a52bc7fcba5e57543e93d293d5a428c73b194f33ba752b0ebeb0262423e7a8f490707a220857f44e191304cffb93cfc75b217ca306292549c8742fe3aa62a464d40c666115015201c0fef3e9555615f91c3d15b6e1556a9b04febc2ae7e3d689ca5f58b51f2717ae8c5153f2c2a4df11ea8cafcc369327c2a0a6f7946daf09be323d59e4b0e42ebcdeca373a6d70a3286382f1405b7107af899da00dbd52324657870bd18ca26f3ef47e0e81cd335c827512e88f24202836e7a1b505f0d03a23d577430d971458a11ff42e36b2d2883b664d402eb7497a90ba1f94829b6d9c6b4c4f7e9dc49882520a6fd2590cb8b41328541b9076e43f6019c3da9084e57960478c268f4215bb98455fbd2981e7e37caf7aaf9008f87cfe196da930637c55da5a34e142a433494e6f92a5985d7e6fc0ec68d2ad25144919af6dc81afc88cd05f01b401730bccc3086c9dd06d38ed522e52e7ffae7671898fb91cec0821c061aaea6c47ae877d2d7f5ca1ecf159e0ea152ce713f652c116f62e12cad293331db922a5fed311ab22096d90fc17ccc53f84d46eae680def0b9949e0d9debff263d575e590941a5ce0b33548beb6dbc01104f6054da73cc349625adece6a54e092d8d740915b91d81df30374a78693d6b69724f05354d61ac0febff4a544b88954d11d3f4927895edf6ad755313227ac87f24f12d70a831df16bd45c4a03570fdf27d698fa5581fce2d002890a3f2059a6bfdf77f0aeee3ad8318449bc1b2d486b225b148a78e921c73a2c37256dfb1ad611e410d5436e0d31d00ab5177da7915a74ef3307927c23c764f5cf62c3e2db86284c9abb39045b625d507f5c8d440557b4dad2a39593fbb572cce25a364aae44134fdd97ef0148690881bee42b6bd929f12cdf07996597a2a8366b12841f8fb8dfc0ece651756637b95c6bdb92320302805b4a700e7d3dfb0b8878862f400f8437a6c153b5fab40d30af07e73cf4345cb6fa81574018a7bc0e8789fae8b8560f4b93d413fa8e0e0218527ccb82873fc9da6cc34b6197c1d8bd9223ab7c4efb1f8cf021450037f4576934d83116655c120062fc3b912176fd395ccc792d492f2730465f8b4c68155b6ceb52e80742d2970e24004171f4685cd78467a4e943a0fecff66dffff10922d69236460dc37c1df9b19dded1ecb932dd8dd2045d2f8e8d3dfb6a83a65d6623553a2aed7a12b78effeeaa58eec84cdefc84923177afb7bd04f6fc3d3332d63ed5c5d6fe8820b9853e7615407eb23962f5232db44bc0267e7f07e47b158de0732a974b80aeb00ffeeca83d26fe21e487ea4472cd9048f942155784af8f68006cdb4286480a7ffa1ba6e93fe7fdb33283359d28bf9311dee59899e0e77aa113fadda21526c8e2bd60f21e182b735a5b0177fb95e948857c6c4ae391b2b4950a35b129e7bf25b7eb2c0857290c55f5d28b78ca1f39f0cd676610805b0a378647ae958182b26de1ddbf80e80d7ab1d2476086ed192e98bee0969bc0e8765278cb5570ccc29ac6d7298821bff4f85895deffcf4ce54a69878cfb41eade0d8703cbcff02352733ace2d800ba68b0fdcc52b94247ecacddf80ad228cf76eb547d276d0f6402054e34c3569e2b53ea3cbc54e49e099372cde3acd1ba47f836a765f855763a175a58ec4d6cecc72375da2d8c956c2868e77bfdb697182b554f0b743d7095cf13a3ba1d19e7590c281bd09ce235898a9682aacb5633b4fa4c3bdd71139c20c518b6a7651a47df7658a5a7ed41b3e7e43543d68c1dd4a5d01ec7e42cabdd6963db84f0d69b5a471ff8b929a8774baee39b14ab325af2ea7756c656c0135a59568499208341333d6b896cf0cc10108970e20313df241d179bd2a4d2392b269e6aeb9d2570bba7e3c67f49e90cf95562f93077a5fb588225724d444fcd8da55921dcff7b0be49ac0171ae98209e729f65bcebe447ccc0a185719f3fd55d1ae263daac4a420da91d05cdfc85d48e5743483dbb6fe81e5c216948953d95d5e725db17df44f05a57c6cc425e55572f9163e536a6d2d51d5213c937f6ddba08fc1f90ec73088a766a685f2c0d43b80422d48eef23b2ea588ea26b8dffb4f0df0cf91d6ea8f14a663ba2b165e4427010742fe63905d62b9dcf2385dce09fe75e4746d5c9c402ee77bfc9f39a28eb9f2751a81b090a499706accafbf5ae1afa9af350fd7481bb", 0x1000}, 0x1006) getpid() sendfile(r2, r2, &(0x7f0000000240), 0x2008000fffffffe) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000900)=0x5) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000880)=@get={0x1, &(0x7f00000007c0)=""/121, 0xb}) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20000000) ptrace(0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1c, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0x0) execve(&(0x7f0000000080)='./file1\x00', &(0x7f0000000680)=[&(0x7f00000000c0)='(proc.-\x00', &(0x7f0000000140)=']selinuxusersecurity-ppp0@\x00', &(0x7f0000000180)='\x00', &(0x7f0000000280)='y\x00', &(0x7f00000002c0)='y\x00', &(0x7f0000000300)='GPL(pself):\x00'], &(0x7f0000000780)=[&(0x7f00000006c0)='lo\xcc]&security-}}\x00', &(0x7f0000000700)='/dev/loop#\x00', &(0x7f0000000740)='\x00']) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) recvmmsg(r1, 0x0, 0x155, 0x2000, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x4, 0x200000) 02:59:30 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x8000) close(r0) 02:59:30 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x8000) close(r0) 02:59:31 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101e4f8d1b12b", @ANYRESHEX], 0x0, 0xd5}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 02:59:31 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x8000) close(r0) [ 862.157602][T28628] ptrace attach of "/root/syz-executor.5"[28627] was attempted by "/root/syz-executor.5"[28628] 02:59:31 executing program 5: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r1 = dup2(r0, r0) read$FUSE(r1, &(0x7f0000001240), 0xffffff7b) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r2) read$FUSE(r3, &(0x7f0000003240), 0x3da) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) 02:59:31 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:31 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) futex(&(0x7f0000000040)=0x2, 0x81, 0xc2c, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x2) lstat(0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 02:59:31 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 862.662550][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 862.669204][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 862.983067][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 862.989702][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 863.222604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 863.229148][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:59:33 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:33 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) write$UHID_CREATE(r0, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000080)=""/22, 0x16}, 0x120) 02:59:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp6\x00') sendfile(r0, r1, 0x0, 0xfffc) 02:59:33 executing program 5: pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(r0, 0x0, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r4, 0x2081fc) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xe8) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000280)=0x40) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r5, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='fd/3\x00') setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000500)={0x7}, 0x4) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001}, 0xfffffe2d) pipe(&(0x7f0000000300)) pipe(&(0x7f0000001a00)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000680)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 02:59:33 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:33 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) futex(&(0x7f0000000040)=0x2, 0x81, 0xc2c, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x2) lstat(0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 864.599429][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.607282][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.615065][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.623005][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.630667][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.638413][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 02:59:33 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(r0) 02:59:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x68) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, 0x0, 0x0) close(r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) [ 864.646059][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.653728][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.661295][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.668964][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.676601][T12409] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 864.743441][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 864.749822][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:59:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x41, &(0x7f0000000040)=0x3, 0x4) r1 = socket$unix(0x1, 0x5, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00b6e) [ 864.866127][T12409] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 [ 864.946699][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 864.954477][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 864.962310][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 864.969904][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 864.977629][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 864.985320][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 864.992956][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.000586][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.008271][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.016058][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.023721][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.031275][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.038955][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 02:59:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x199, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/157, 0x9d}], 0x100000000000000f, 0x0, 0xffffffffffffffee}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xff8c, 0x0, 0x0, 0x800e00639) dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0063d) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000140)=""/102, 0x66}], 0x1}, 0x2) shutdown(r1, 0x0) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x42) shutdown(r3, 0x0) shutdown(r2, 0x0) 02:59:34 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x0) close(r0) [ 865.046638][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.054271][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.062026][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.062748][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 865.069609][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.076010][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 865.083083][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.096368][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.104033][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.111637][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.119265][T12409] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 865.229013][T12409] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz0 02:59:34 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) write$UHID_CREATE(r0, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000080)=""/22, 0x16}, 0x120) 02:59:34 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:34 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x0) close(r0) [ 865.491300][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.499014][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.506699][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.514443][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.522129][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.529710][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.537603][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.546258][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.553979][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.561582][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.569349][T12390] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 865.638844][T12390] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz1 02:59:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x41, &(0x7f0000000040)=0x3, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0xa5b360b1c7ccb90a, 0xffffffffffffffff) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00b6e) 02:59:34 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) write$UHID_CREATE(r0, &(0x7f0000000440)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000080)=""/22, 0x16}, 0x120) 02:59:34 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x0) close(r0) [ 866.063522][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.071143][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.079038][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.086765][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.094548][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.102209][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.109783][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.117406][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.125139][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.132827][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.140426][T12409] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 866.441039][T12409] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 866.551938][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.559750][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.567925][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.575571][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.584425][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.592014][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.599590][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.607295][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.614957][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.622649][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.630219][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.637857][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.645445][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.653076][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.660639][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.668278][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.675905][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.683575][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.691118][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.698797][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.706407][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 866.714065][T12409] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 02:59:35 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) futex(&(0x7f0000000040)=0x2, 0x81, 0xc2c, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x2) lstat(0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 02:59:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x100000000000036c}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x245, 0x0, 0x0, 0x800e00512) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/105, 0x69}, {0x0}], 0x2}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f00000016c0)=[{&(0x7f0000000480)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r4, 0x0) shutdown(r1, 0x0) 02:59:35 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(0xffffffffffffffff) 02:59:35 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 866.747236][T12409] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz0 02:59:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x100000000000036c}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x245, 0x0, 0x0, 0x800e00512) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/105, 0x69}, {0x0}, {0x0}], 0x3}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000001b40)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1) shutdown(r4, 0x0) shutdown(r1, 0x0) 02:59:36 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(0xffffffffffffffff) 02:59:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/152, 0x98}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) r2 = dup2(r1, r0) accept$inet(r1, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r2, 0x0) 02:59:36 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) close(0xffffffffffffffff) 02:59:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002d000503d25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025641700d1bd", 0x2e}], 0x1}, 0x0) 02:59:36 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r9 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r9, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) 02:59:36 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e001000"/46, 0x2e}], 0x1}, 0x0) 02:59:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001400)=""/184, 0xb8}], 0x1}, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 867.763159][T28883] IPv6: NLM_F_CREATE should be specified when creating new route [ 867.950731][T28888] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 867.961190][T28888] CPU: 0 PID: 28888 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 867.969223][T28888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 867.979331][T28888] Call Trace: [ 867.982746][T28888] dump_stack+0x191/0x1f0 [ 867.987187][T28888] dump_header+0x1e7/0xd00 [ 867.991710][T28888] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 867.997960][T28888] ? ___ratelimit+0x542/0x720 [ 868.002737][T28888] ? task_will_free_mem+0x2c9/0x810 [ 868.008063][T28888] oom_kill_process+0x210/0x560 [ 868.013046][T28888] out_of_memory+0x16cf/0x1c20 [ 868.017929][T28888] memory_max_write+0x90b/0xb60 [ 868.022891][T28888] ? memory_max_show+0x1b0/0x1b0 [ 868.027903][T28888] cgroup_file_write+0x41a/0x8e0 [ 868.032940][T28888] ? cgroup_seqfile_stop+0x150/0x150 [ 868.038301][T28888] kernfs_fop_write+0x55f/0x840 [ 868.043251][T28888] ? kernfs_fop_read+0x9a0/0x9a0 [ 868.048349][T28888] __vfs_write+0x1a9/0xcb0 [ 868.052859][T28888] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 868.058990][T28888] ? __sb_start_write+0x10b/0x230 [ 868.064092][T28888] vfs_write+0x481/0x920 [ 868.068436][T28888] ksys_write+0x265/0x430 [ 868.072849][T28888] __se_sys_write+0x92/0xb0 [ 868.077416][T28888] __x64_sys_write+0x4a/0x70 [ 868.082069][T28888] do_syscall_64+0xbc/0xf0 [ 868.086633][T28888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 868.092582][T28888] RIP: 0033:0x459829 [ 868.096560][T28888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.116233][T28888] RSP: 002b:00007fce4f4fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 868.124723][T28888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 868.132759][T28888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 868.140798][T28888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 868.148833][T28888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce4f4fe6d4 [ 868.156871][T28888] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 868.167421][T28888] memory: usage 12584kB, limit 0kB, failcnt 0 [ 868.173623][T28888] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 868.180504][T28888] Memory cgroup stats for /syz0: [ 868.180866][T28888] anon 6463488 [ 868.180866][T28888] file 110592 [ 868.180866][T28888] kernel_stack 1376256 [ 868.180866][T28888] slab 2170880 [ 868.180866][T28888] sock 69632 [ 868.180866][T28888] shmem 0 [ 868.180866][T28888] file_mapped 0 [ 868.180866][T28888] file_dirty 0 [ 868.180866][T28888] file_writeback 0 [ 868.180866][T28888] anon_thp 4194304 [ 868.180866][T28888] inactive_anon 135168 [ 868.180866][T28888] active_anon 6553600 [ 868.180866][T28888] inactive_file 0 [ 868.180866][T28888] active_file 0 [ 868.180866][T28888] unevictable 135168 [ 868.180866][T28888] slab_reclaimable 270336 [ 868.180866][T28888] slab_unreclaimable 1900544 [ 868.180866][T28888] pgfault 70356 [ 868.180866][T28888] pgmajfault 0 [ 868.180866][T28888] workingset_refault 0 [ 868.180866][T28888] workingset_activate 0 [ 868.180866][T28888] workingset_nodereclaim 0 [ 868.180866][T28888] pgrefill 0 [ 868.180866][T28888] pgscan 0 [ 868.180866][T28888] pgsteal 0 [ 868.180866][T28888] pgactivate 0 [ 868.278783][T28888] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18866,uid=0 [ 868.295335][T28888] Memory cgroup out of memory: Killed process 18866 (syz-executor.0) total-vm:72708kB, anon-rss:2220kB, file-rss:35780kB, shmem-rss:0kB [ 868.310233][T28888] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 868.312865][ T1822] oom_reaper: reaped process 18866 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 868.320602][T28888] CPU: 0 PID: 28888 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 868.339540][T28888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.349663][T28888] Call Trace: [ 868.353043][T28888] dump_stack+0x191/0x1f0 [ 868.357458][T28888] dump_header+0x1e7/0xd00 [ 868.361941][T28888] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 868.368171][T28888] ? ___ratelimit+0x542/0x720 [ 868.372925][T28888] ? task_will_free_mem+0x2c9/0x810 [ 868.378220][T28888] oom_kill_process+0x210/0x560 [ 868.383169][T28888] out_of_memory+0x16cf/0x1c20 [ 868.388224][T28888] memory_max_write+0x90b/0xb60 [ 868.393193][T28888] ? memory_max_show+0x1b0/0x1b0 [ 868.398195][T28888] cgroup_file_write+0x41a/0x8e0 [ 868.403218][T28888] ? cgroup_seqfile_stop+0x150/0x150 [ 868.408566][T28888] kernfs_fop_write+0x55f/0x840 [ 868.413518][T28888] ? kernfs_fop_read+0x9a0/0x9a0 [ 868.418523][T28888] __vfs_write+0x1a9/0xcb0 [ 868.423026][T28888] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 868.429169][T28888] ? __sb_start_write+0x10b/0x230 [ 868.434280][T28888] vfs_write+0x481/0x920 [ 868.438626][T28888] ksys_write+0x265/0x430 [ 868.443054][T28888] __se_sys_write+0x92/0xb0 [ 868.447649][T28888] __x64_sys_write+0x4a/0x70 [ 868.452311][T28888] do_syscall_64+0xbc/0xf0 [ 868.456866][T28888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 868.462854][T28888] RIP: 0033:0x459829 [ 868.466842][T28888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.486598][T28888] RSP: 002b:00007fce4f4fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 868.495124][T28888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 868.503144][T28888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 868.511193][T28888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 868.519316][T28888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce4f4fe6d4 [ 868.527353][T28888] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 868.535621][T28888] memory: usage 10408kB, limit 0kB, failcnt 0 [ 868.541831][T28888] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 868.548706][T28888] Memory cgroup stats for /syz0: [ 868.549074][T28888] anon 4382720 [ 868.549074][T28888] file 110592 [ 868.549074][T28888] kernel_stack 1376256 [ 868.549074][T28888] slab 2170880 [ 868.549074][T28888] sock 69632 [ 868.549074][T28888] shmem 0 [ 868.549074][T28888] file_mapped 0 [ 868.549074][T28888] file_dirty 0 [ 868.549074][T28888] file_writeback 0 [ 868.549074][T28888] anon_thp 2097152 [ 868.549074][T28888] inactive_anon 135168 [ 868.549074][T28888] active_anon 4395008 [ 868.549074][T28888] inactive_file 0 [ 868.549074][T28888] active_file 0 [ 868.549074][T28888] unevictable 135168 [ 868.549074][T28888] slab_reclaimable 270336 [ 868.549074][T28888] slab_unreclaimable 1900544 [ 868.549074][T28888] pgfault 70356 [ 868.549074][T28888] pgmajfault 0 [ 868.549074][T28888] workingset_refault 0 [ 868.549074][T28888] workingset_activate 0 [ 868.549074][T28888] workingset_nodereclaim 0 [ 868.549074][T28888] pgrefill 0 [ 868.549074][T28888] pgscan 0 [ 868.549074][T28888] pgsteal 0 [ 868.549074][T28888] pgactivate 0 [ 868.645149][T28888] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=18736,uid=0 [ 868.660954][T28888] Memory cgroup out of memory: Killed process 18736 (syz-executor.0) total-vm:72708kB, anon-rss:2220kB, file-rss:35780kB, shmem-rss:0kB [ 868.677599][ T1822] oom_reaper: reaped process 18736 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 868.690088][T28888] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 868.700505][T28888] CPU: 0 PID: 28888 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 868.708601][T28888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.718745][T28888] Call Trace: [ 868.722162][T28888] dump_stack+0x191/0x1f0 [ 868.726584][T28888] dump_header+0x1e7/0xd00 [ 868.731089][T28888] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 868.737324][T28888] ? ___ratelimit+0x542/0x720 [ 868.742249][T28888] ? task_will_free_mem+0x2c9/0x810 [ 868.747541][T28888] oom_kill_process+0x210/0x560 [ 868.752511][T28888] out_of_memory+0x16cf/0x1c20 [ 868.757386][T28888] memory_max_write+0x90b/0xb60 [ 868.762334][T28888] ? memory_max_show+0x1b0/0x1b0 [ 868.767344][T28888] cgroup_file_write+0x41a/0x8e0 [ 868.772370][T28888] ? cgroup_seqfile_stop+0x150/0x150 [ 868.777735][T28888] kernfs_fop_write+0x55f/0x840 [ 868.782693][T28888] ? kernfs_fop_read+0x9a0/0x9a0 [ 868.787697][T28888] __vfs_write+0x1a9/0xcb0 [ 868.792198][T28888] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 868.798343][T28888] ? __sb_start_write+0x10b/0x230 [ 868.803464][T28888] vfs_write+0x481/0x920 [ 868.807827][T28888] ksys_write+0x265/0x430 [ 868.812282][T28888] __se_sys_write+0x92/0xb0 [ 868.816885][T28888] __x64_sys_write+0x4a/0x70 [ 868.821539][T28888] do_syscall_64+0xbc/0xf0 [ 868.826048][T28888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 868.832033][T28888] RIP: 0033:0x459829 [ 868.836003][T28888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 868.855735][T28888] RSP: 002b:00007fce4f4fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 868.864310][T28888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 868.872333][T28888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 868.880354][T28888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 868.888376][T28888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce4f4fe6d4 [ 868.896411][T28888] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 868.904655][T28888] memory: usage 8032kB, limit 0kB, failcnt 8 [ 868.910696][T28888] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 868.917712][T28888] Memory cgroup stats for /syz0: [ 868.918097][T28888] anon 2154496 [ 868.918097][T28888] file 110592 [ 868.918097][T28888] kernel_stack 1310720 [ 868.918097][T28888] slab 2170880 [ 868.918097][T28888] sock 69632 [ 868.918097][T28888] shmem 0 [ 868.918097][T28888] file_mapped 0 [ 868.918097][T28888] file_dirty 0 [ 868.918097][T28888] file_writeback 0 [ 868.918097][T28888] anon_thp 0 [ 868.918097][T28888] inactive_anon 135168 [ 868.918097][T28888] active_anon 2166784 [ 868.918097][T28888] inactive_file 0 [ 868.918097][T28888] active_file 0 [ 868.918097][T28888] unevictable 135168 [ 868.918097][T28888] slab_reclaimable 270336 [ 868.918097][T28888] slab_unreclaimable 1900544 [ 868.918097][T28888] pgfault 70356 [ 868.918097][T28888] pgmajfault 0 [ 868.918097][T28888] workingset_refault 0 [ 868.918097][T28888] workingset_activate 0 [ 868.918097][T28888] workingset_nodereclaim 0 [ 868.918097][T28888] pgrefill 0 [ 868.918097][T28888] pgscan 0 [ 868.918097][T28888] pgsteal 0 [ 868.918097][T28888] pgactivate 0 [ 869.018612][T28888] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=25964,uid=0 [ 869.034349][T28888] Memory cgroup out of memory: Killed process 25964 (syz-executor.0) total-vm:72840kB, anon-rss:188kB, file-rss:35788kB, shmem-rss:0kB [ 869.050733][ T1822] oom_reaper: reaped process 25964 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 869.082184][T28879] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 869.092667][T28879] CPU: 1 PID: 28879 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 869.100708][T28879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.110841][T28879] Call Trace: [ 869.114231][T28879] dump_stack+0x191/0x1f0 [ 869.118659][T28879] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 869.124751][T28879] dump_header+0x1e7/0xd00 02:59:38 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) futex(&(0x7f0000000040)=0x2, 0x81, 0xc2c, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x2) lstat(0x0, &(0x7f00000005c0)) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 02:59:38 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x41, &(0x7f0000000040)=0x3, 0x4) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00b6e) 02:59:38 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:38 executing program 4: shutdown(0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/105, 0x69}, {0x0}], 0x2}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r3, &(0x7f00000016c0)=[{&(0x7f0000000480)=""/215, 0xd7}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) shutdown(r2, 0x0) 02:59:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) [ 869.129273][T28879] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 869.135511][T28879] ? ___ratelimit+0x542/0x720 [ 869.140288][T28879] ? task_will_free_mem+0x2c9/0x810 [ 869.145601][T28879] oom_kill_process+0x210/0x560 [ 869.150549][T28879] out_of_memory+0x16cf/0x1c20 [ 869.155418][T28879] try_charge+0x2889/0x3d70 [ 869.160028][T28879] ? __anon_vma_interval_tree_augment_rotate+0x240/0x3e0 [ 869.167183][T28879] mem_cgroup_try_charge+0xa29/0xe40 [ 869.172586][T28879] mem_cgroup_try_charge_delay+0x7e/0x140 [ 869.178396][T28879] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 869.184475][T28879] handle_mm_fault+0x5344/0x9f00 [ 869.189549][T28879] do_user_addr_fault+0x905/0x1510 [ 869.194786][T28879] __do_page_fault+0x1a2/0x410 [ 869.199638][T28879] do_page_fault+0xbb/0x500 [ 869.204215][T28879] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 869.209677][T28879] page_fault+0x4e/0x60 [ 869.213882][T28879] RIP: 0033:0x41116f [ 869.217837][T28879] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 869.237502][T28879] RSP: 002b:0000000000a6fb10 EFLAGS: 00010206 [ 869.243649][T28879] RAX: 00007fce4f4bd000 RBX: 0000000000020000 RCX: 000000000045987a [ 869.251690][T28879] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 869.259735][T28879] RBP: 0000000000a6fbf0 R08: ffffffffffffffff R09: 0000000000000000 [ 869.267777][T28879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000a6fce0 [ 869.277291][T28879] R13: 00007fce4f4dd700 R14: 0000000000000002 R15: 000000000075c07c [ 869.286455][T28879] memory: usage 7496kB, limit 0kB, failcnt 8 [ 869.292567][T28879] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 869.299547][T28879] Memory cgroup stats for /syz0: [ 869.299868][T28879] anon 2019328 [ 869.299868][T28879] file 110592 [ 869.299868][T28879] kernel_stack 1179648 [ 869.299868][T28879] slab 2170880 [ 869.299868][T28879] sock 69632 [ 869.299868][T28879] shmem 0 [ 869.299868][T28879] file_mapped 0 [ 869.299868][T28879] file_dirty 0 [ 869.299868][T28879] file_writeback 0 [ 869.299868][T28879] anon_thp 0 [ 869.299868][T28879] inactive_anon 135168 [ 869.299868][T28879] active_anon 2031616 [ 869.299868][T28879] inactive_file 0 [ 869.299868][T28879] active_file 0 [ 869.299868][T28879] unevictable 135168 [ 869.299868][T28879] slab_reclaimable 270336 [ 869.299868][T28879] slab_unreclaimable 1900544 [ 869.299868][T28879] pgfault 70356 [ 869.299868][T28879] pgmajfault 0 [ 869.299868][T28879] workingset_refault 0 [ 869.299868][T28879] workingset_activate 0 [ 869.299868][T28879] workingset_nodereclaim 0 [ 869.299868][T28879] pgrefill 0 [ 869.299868][T28879] pgscan 0 [ 869.299868][T28879] pgsteal 0 [ 869.299868][T28879] pgactivate 0 [ 869.395415][T28879] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24742,uid=0 [ 869.411364][T28879] Memory cgroup out of memory: Killed process 24742 (syz-executor.0) total-vm:72708kB, anon-rss:180kB, file-rss:35780kB, shmem-rss:0kB [ 869.463646][ T1822] oom_reaper: reaped process 24742 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 869.474902][T28888] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 869.485285][T28888] CPU: 0 PID: 28888 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 869.493321][T28888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.503424][T28888] Call Trace: [ 869.506800][T28888] dump_stack+0x191/0x1f0 [ 869.511215][T28888] dump_header+0x1e7/0xd00 [ 869.515701][T28888] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 869.521925][T28888] ? ___ratelimit+0x542/0x720 [ 869.526678][T28888] ? task_will_free_mem+0x2c9/0x810 [ 869.531972][T28888] oom_kill_process+0x210/0x560 [ 869.536912][T28888] out_of_memory+0x16cf/0x1c20 [ 869.541758][T28888] memory_max_write+0x90b/0xb60 [ 869.546711][T28888] ? memory_max_show+0x1b0/0x1b0 [ 869.551723][T28888] cgroup_file_write+0x41a/0x8e0 [ 869.556744][T28888] ? cgroup_seqfile_stop+0x150/0x150 [ 869.562116][T28888] kernfs_fop_write+0x55f/0x840 [ 869.567057][T28888] ? kernfs_fop_read+0x9a0/0x9a0 [ 869.572105][T28888] __vfs_write+0x1a9/0xcb0 [ 869.576611][T28888] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 869.582744][T28888] ? __sb_start_write+0x10b/0x230 [ 869.587844][T28888] vfs_write+0x481/0x920 [ 869.592230][T28888] ksys_write+0x265/0x430 [ 869.596638][T28888] __se_sys_write+0x92/0xb0 [ 869.601210][T28888] __x64_sys_write+0x4a/0x70 [ 869.605862][T28888] do_syscall_64+0xbc/0xf0 [ 869.610345][T28888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 869.616287][T28888] RIP: 0033:0x459829 [ 869.620240][T28888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 869.640433][T28888] RSP: 002b:00007fce4f4fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 869.648968][T28888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 869.657097][T28888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 869.665132][T28888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 869.673158][T28888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce4f4fe6d4 [ 869.681172][T28888] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 869.689608][T28888] memory: usage 7172kB, limit 0kB, failcnt 14 [ 869.695825][T28888] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 869.703099][T28888] Memory cgroup stats for /syz0: [ 869.703515][T28888] anon 1875968 [ 869.703515][T28888] file 110592 [ 869.703515][T28888] kernel_stack 1114112 [ 869.703515][T28888] slab 2170880 [ 869.703515][T28888] sock 69632 [ 869.703515][T28888] shmem 0 [ 869.703515][T28888] file_mapped 0 [ 869.703515][T28888] file_dirty 0 [ 869.703515][T28888] file_writeback 0 [ 869.703515][T28888] anon_thp 0 [ 869.703515][T28888] inactive_anon 135168 [ 869.703515][T28888] active_anon 1896448 [ 869.703515][T28888] inactive_file 0 [ 869.703515][T28888] active_file 0 [ 869.703515][T28888] unevictable 135168 [ 869.703515][T28888] slab_reclaimable 270336 [ 869.703515][T28888] slab_unreclaimable 1900544 [ 869.703515][T28888] pgfault 70356 [ 869.703515][T28888] pgmajfault 0 [ 869.703515][T28888] workingset_refault 0 [ 869.703515][T28888] workingset_activate 0 [ 869.703515][T28888] workingset_nodereclaim 0 [ 869.703515][T28888] pgrefill 0 [ 869.703515][T28888] pgscan 0 [ 869.703515][T28888] pgsteal 0 [ 869.703515][T28888] pgactivate 0 [ 869.799095][T28888] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=26853,uid=0 [ 869.814915][T28888] Memory cgroup out of memory: Killed process 26853 (syz-executor.0) total-vm:72708kB, anon-rss:176kB, file-rss:35780kB, shmem-rss:0kB [ 869.829524][T28888] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 869.830858][ T1822] oom_reaper: reaped process 26853 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 869.839994][T28888] CPU: 0 PID: 28888 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 869.859031][T28888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.869220][T28888] Call Trace: [ 869.872939][T28888] dump_stack+0x191/0x1f0 [ 869.877364][T28888] dump_header+0x1e7/0xd00 [ 869.881845][T28888] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 869.888066][T28888] ? ___ratelimit+0x542/0x720 [ 869.892826][T28888] ? task_will_free_mem+0x2c9/0x810 [ 869.898127][T28888] oom_kill_process+0x210/0x560 [ 869.903056][T28888] out_of_memory+0x16cf/0x1c20 [ 869.907910][T28888] memory_max_write+0x90b/0xb60 [ 869.912854][T28888] ? memory_max_show+0x1b0/0x1b0 [ 869.917845][T28888] cgroup_file_write+0x41a/0x8e0 [ 869.922861][T28888] ? cgroup_seqfile_stop+0x150/0x150 [ 869.928215][T28888] kernfs_fop_write+0x55f/0x840 [ 869.933152][T28888] ? kernfs_fop_read+0x9a0/0x9a0 [ 869.938149][T28888] __vfs_write+0x1a9/0xcb0 [ 869.942642][T28888] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 869.948759][T28888] ? __sb_start_write+0x10b/0x230 [ 869.953858][T28888] vfs_write+0x481/0x920 [ 869.958178][T28888] ksys_write+0x265/0x430 [ 869.962587][T28888] __se_sys_write+0x92/0xb0 [ 869.967157][T28888] __x64_sys_write+0x4a/0x70 [ 869.971817][T28888] do_syscall_64+0xbc/0xf0 [ 869.976327][T28888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 869.982269][T28888] RIP: 0033:0x459829 [ 869.986216][T28888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.005885][T28888] RSP: 002b:00007fce4f4fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 02:59:38 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) [ 870.014365][T28888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 870.022375][T28888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 870.030401][T28888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 870.038420][T28888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce4f4fe6d4 [ 870.046440][T28888] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 870.054842][T28888] memory: usage 7040kB, limit 0kB, failcnt 14 [ 870.061069][T28888] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 870.068135][T28888] Memory cgroup stats for /syz0: [ 870.068496][T28888] anon 1740800 [ 870.068496][T28888] file 110592 [ 870.068496][T28888] kernel_stack 1114112 [ 870.068496][T28888] slab 2170880 [ 870.068496][T28888] sock 69632 [ 870.068496][T28888] shmem 0 [ 870.068496][T28888] file_mapped 0 [ 870.068496][T28888] file_dirty 0 [ 870.068496][T28888] file_writeback 0 [ 870.068496][T28888] anon_thp 0 [ 870.068496][T28888] inactive_anon 135168 [ 870.068496][T28888] active_anon 1761280 [ 870.068496][T28888] inactive_file 0 [ 870.068496][T28888] active_file 0 [ 870.068496][T28888] unevictable 135168 [ 870.068496][T28888] slab_reclaimable 270336 [ 870.068496][T28888] slab_unreclaimable 1900544 [ 870.068496][T28888] pgfault 70356 [ 870.068496][T28888] pgmajfault 0 [ 870.068496][T28888] workingset_refault 0 [ 870.068496][T28888] workingset_activate 0 [ 870.068496][T28888] workingset_nodereclaim 0 [ 870.068496][T28888] pgrefill 0 [ 870.068496][T28888] pgscan 0 [ 870.068496][T28888] pgsteal 0 [ 870.068496][T28888] pgactivate 0 [ 870.164731][T28888] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=24760,uid=0 [ 870.180509][T28888] Memory cgroup out of memory: Killed process 24760 (syz-executor.0) total-vm:72708kB, anon-rss:176kB, file-rss:35780kB, shmem-rss:0kB [ 870.201443][ T1822] oom_reaper: reaped process 24760 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 870.226698][T28879] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 870.237239][T28879] CPU: 1 PID: 28879 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 870.245274][T28879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.255380][T28879] Call Trace: [ 870.258753][T28879] dump_stack+0x191/0x1f0 [ 870.263176][T28879] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 870.269246][T28879] dump_header+0x1e7/0xd00 [ 870.273744][T28879] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 870.279974][T28879] ? ___ratelimit+0x542/0x720 [ 870.284739][T28879] ? task_will_free_mem+0x2c9/0x810 [ 870.290027][T28879] oom_kill_process+0x210/0x560 [ 870.294957][T28879] out_of_memory+0x16cf/0x1c20 [ 870.299806][T28879] try_charge+0x2889/0x3d70 [ 870.304408][T28879] ? __anon_vma_interval_tree_augment_rotate+0x240/0x3e0 [ 870.311545][T28879] mem_cgroup_try_charge+0xa29/0xe40 [ 870.316938][T28879] mem_cgroup_try_charge_delay+0x7e/0x140 [ 870.322725][T28879] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 870.328777][T28879] handle_mm_fault+0x5344/0x9f00 [ 870.333829][T28879] do_user_addr_fault+0x905/0x1510 [ 870.339033][T28879] __do_page_fault+0x1a2/0x410 [ 870.343873][T28879] do_page_fault+0xbb/0x500 [ 870.348447][T28879] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 870.353896][T28879] page_fault+0x4e/0x60 [ 870.358090][T28879] RIP: 0033:0x41116f [ 870.362043][T28879] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 870.381726][T28879] RSP: 002b:0000000000a6fb10 EFLAGS: 00010206 [ 870.387864][T28879] RAX: 00007fce4f4bd000 RBX: 0000000000020000 RCX: 000000000045987a [ 870.395897][T28879] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 870.403939][T28879] RBP: 0000000000a6fbf0 R08: ffffffffffffffff R09: 0000000000000000 [ 870.411979][T28879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000a6fce0 [ 870.420017][T28879] R13: 00007fce4f4dd700 R14: 0000000000000002 R15: 000000000075c07c [ 870.428616][T28879] memory: usage 6712kB, limit 0kB, failcnt 14 [ 870.434824][T28879] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 870.441804][T28879] Memory cgroup stats for /syz0: [ 870.442133][T28879] anon 1601536 [ 870.442133][T28879] file 110592 [ 870.442133][T28879] kernel_stack 1048576 [ 870.442133][T28879] slab 2170880 [ 870.442133][T28879] sock 69632 [ 870.442133][T28879] shmem 0 [ 870.442133][T28879] file_mapped 0 [ 870.442133][T28879] file_dirty 0 [ 870.442133][T28879] file_writeback 0 [ 870.442133][T28879] anon_thp 0 [ 870.442133][T28879] inactive_anon 135168 [ 870.442133][T28879] active_anon 1626112 [ 870.442133][T28879] inactive_file 0 [ 870.442133][T28879] active_file 0 [ 870.442133][T28879] unevictable 135168 [ 870.442133][T28879] slab_reclaimable 270336 [ 870.442133][T28879] slab_unreclaimable 1900544 [ 870.442133][T28879] pgfault 70356 [ 870.442133][T28879] pgmajfault 0 [ 870.442133][T28879] workingset_refault 0 [ 870.442133][T28879] workingset_activate 0 [ 870.442133][T28879] workingset_nodereclaim 0 [ 870.442133][T28879] pgrefill 0 [ 870.442133][T28879] pgscan 0 [ 870.442133][T28879] pgsteal 0 [ 870.442133][T28879] pgactivate 0 [ 870.537498][T28879] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=21564,uid=0 [ 870.553210][T28879] Memory cgroup out of memory: Killed process 21564 (syz-executor.0) total-vm:72708kB, anon-rss:176kB, file-rss:35780kB, shmem-rss:0kB 02:59:39 executing program 4: close(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) syz_open_dev$video(0x0, 0x8, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) [ 870.645510][ T1822] oom_reaper: reaped process 21564 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 870.656828][T28888] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 870.667167][T28888] CPU: 0 PID: 28888 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 870.675209][T28888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.685342][T28888] Call Trace: [ 870.688718][T28888] dump_stack+0x191/0x1f0 02:59:39 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f0000220100"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 870.693147][T28888] dump_header+0x1e7/0xd00 [ 870.697633][T28888] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 870.703901][T28888] ? ___ratelimit+0x542/0x720 [ 870.708677][T28888] ? task_will_free_mem+0x2c9/0x810 [ 870.713963][T28888] oom_kill_process+0x210/0x560 [ 870.718894][T28888] out_of_memory+0x16cf/0x1c20 [ 870.723780][T28888] memory_max_write+0x90b/0xb60 [ 870.728752][T28888] ? memory_max_show+0x1b0/0x1b0 [ 870.733764][T28888] cgroup_file_write+0x41a/0x8e0 [ 870.738794][T28888] ? cgroup_seqfile_stop+0x150/0x150 [ 870.744171][T28888] kernfs_fop_write+0x55f/0x840 [ 870.749109][T28888] ? kernfs_fop_read+0x9a0/0x9a0 [ 870.754123][T28888] __vfs_write+0x1a9/0xcb0 [ 870.758635][T28888] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 870.764775][T28888] ? __sb_start_write+0x10b/0x230 [ 870.769882][T28888] vfs_write+0x481/0x920 [ 870.774229][T28888] ksys_write+0x265/0x430 [ 870.778664][T28888] __se_sys_write+0x92/0xb0 [ 870.783260][T28888] __x64_sys_write+0x4a/0x70 [ 870.787937][T28888] do_syscall_64+0xbc/0xf0 [ 870.792451][T28888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 870.798427][T28888] RIP: 0033:0x459829 [ 870.802388][T28888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.822271][T28888] RSP: 002b:00007fce4f4fdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 870.830775][T28888] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 870.838833][T28888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 870.846863][T28888] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 870.854894][T28888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce4f4fe6d4 [ 870.862938][T28888] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 870.871224][T28888] memory: usage 6592kB, limit 0kB, failcnt 62 [ 870.877439][T28888] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 870.884476][T28888] Memory cgroup stats for /syz0: [ 870.884815][T28888] anon 1601536 [ 870.884815][T28888] file 110592 [ 870.884815][T28888] kernel_stack 1048576 [ 870.884815][T28888] slab 2170880 [ 870.884815][T28888] sock 69632 [ 870.884815][T28888] shmem 0 [ 870.884815][T28888] file_mapped 0 [ 870.884815][T28888] file_dirty 0 [ 870.884815][T28888] file_writeback 0 [ 870.884815][T28888] anon_thp 0 [ 870.884815][T28888] inactive_anon 135168 [ 870.884815][T28888] active_anon 1490944 [ 870.884815][T28888] inactive_file 0 [ 870.884815][T28888] active_file 0 [ 870.884815][T28888] unevictable 135168 [ 870.884815][T28888] slab_reclaimable 270336 [ 870.884815][T28888] slab_unreclaimable 1900544 [ 870.884815][T28888] pgfault 70356 [ 870.884815][T28888] pgmajfault 0 [ 870.884815][T28888] workingset_refault 0 [ 870.884815][T28888] workingset_activate 0 [ 870.884815][T28888] workingset_nodereclaim 0 [ 870.884815][T28888] pgrefill 0 [ 870.884815][T28888] pgscan 0 [ 870.884815][T28888] pgsteal 0 [ 870.884815][T28888] pgactivate 0 [ 870.980412][T28888] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=20218,uid=0 [ 870.996163][T28888] Memory cgroup out of memory: Killed process 20218 (syz-executor.0) total-vm:72576kB, anon-rss:168kB, file-rss:35788kB, shmem-rss:0kB [ 871.012767][ T1822] oom_reaper: reaped process 20218 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB 02:59:40 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r9 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r9, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) [ 871.302854][ C0] net_ratelimit: 6 callbacks suppressed [ 871.302876][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 871.315127][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:59:40 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RREAD(r0, &(0x7f0000000040)={0xb}, 0xb) 02:59:40 executing program 4: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r9 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r9, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) [ 871.542776][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 871.549391][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 871.583527][T12296] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 871.593971][T12296] CPU: 0 PID: 12296 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 871.602020][T12296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.612175][T12296] Call Trace: [ 871.615556][T12296] dump_stack+0x191/0x1f0 [ 871.619963][T12296] dump_header+0x1e7/0xd00 [ 871.624448][T12296] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 871.630658][T12296] ? ___ratelimit+0x542/0x720 [ 871.635416][T12296] ? task_will_free_mem+0x2c9/0x810 [ 871.640698][T12296] oom_kill_process+0x210/0x560 [ 871.645627][T12296] out_of_memory+0x16cf/0x1c20 [ 871.650471][T12296] try_charge+0x2889/0x3d70 [ 871.655046][T12296] ? __wake_up_common+0x41b/0x9f0 [ 871.660194][T12296] mem_cgroup_try_charge+0xa29/0xe40 [ 871.665557][T12296] mem_cgroup_try_charge_delay+0x7e/0x140 [ 871.671467][T12296] wp_page_copy+0x776/0x26d0 [ 871.676135][T12296] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 871.682364][T12296] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 871.688617][T12296] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 871.694675][T12296] do_wp_page+0x1fc2/0x3670 [ 871.699450][T12296] handle_mm_fault+0x46d8/0x9f00 [ 871.704491][T12296] do_user_addr_fault+0x905/0x1510 [ 871.709701][T12296] __do_page_fault+0x1a2/0x410 [ 871.714529][T12296] do_page_fault+0xbb/0x500 [ 871.719101][T12296] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 871.724547][T12296] page_fault+0x4e/0x60 [ 871.728741][T12296] RIP: 0033:0x4718f3 [ 871.732686][T12296] Code: 00 4c 89 e7 89 8d 50 fb ff ff 45 31 ff 48 89 85 a8 fb ff ff 48 8b 42 08 48 89 85 b0 fb ff ff 48 8b 42 10 48 89 85 b8 fb ff ff 48 05 fd ff 8b 8d 50 fb ff ff 49 89 c6 48 89 85 68 fb ff ff 80 [ 871.752343][T12296] RSP: 002b:0000000000a6cfc0 EFLAGS: 00010246 [ 871.758497][T12296] RAX: 0000000000a6fbf0 RBX: 0000000000a6d540 RCX: 00000000fbad8004 [ 871.766518][T12296] RDX: 0000000000a6fbd8 RSI: 0000000000000025 RDI: 00000000004be164 [ 871.774564][T12296] RBP: 0000000000a6d510 R08: 000055555640f940 R09: 000000000000000c [ 871.782587][T12296] R10: 00000000004be164 R11: 0000000000000246 R12: 00000000004be164 [ 871.790618][T12296] R13: 0000000000a6fbd8 R14: 0000000000000000 R15: 0000000000000000 [ 871.799042][T12296] memory: usage 5356kB, limit 0kB, failcnt 79 [ 871.805283][T12296] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 871.812357][T12296] Memory cgroup stats for /syz0: [ 871.812771][T12296] anon 1269760 [ 871.812771][T12296] file 110592 [ 871.812771][T12296] kernel_stack 655360 [ 871.812771][T12296] slab 2170880 [ 871.812771][T12296] sock 69632 [ 871.812771][T12296] shmem 0 [ 871.812771][T12296] file_mapped 0 [ 871.812771][T12296] file_dirty 0 [ 871.812771][T12296] file_writeback 0 [ 871.812771][T12296] anon_thp 0 [ 871.812771][T12296] inactive_anon 135168 [ 871.812771][T12296] active_anon 1355776 [ 871.812771][T12296] inactive_file 0 [ 871.812771][T12296] active_file 0 [ 871.812771][T12296] unevictable 135168 [ 871.812771][T12296] slab_reclaimable 270336 [ 871.812771][T12296] slab_unreclaimable 1900544 [ 871.812771][T12296] pgfault 70389 [ 871.812771][T12296] pgmajfault 0 [ 871.812771][T12296] workingset_refault 0 [ 871.812771][T12296] workingset_activate 0 [ 871.812771][T12296] workingset_nodereclaim 0 [ 871.812771][T12296] pgrefill 0 [ 871.812771][T12296] pgscan 0 [ 871.812771][T12296] pgsteal 0 [ 871.812771][T12296] pgactivate 0 [ 871.908167][T12296] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16649,uid=0 [ 871.924156][T12296] Memory cgroup out of memory: Killed process 16649 (syz-executor.0) total-vm:72708kB, anon-rss:176kB, file-rss:35780kB, shmem-rss:0kB [ 871.940151][ T1822] oom_reaper: reaped process 16649 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 871.947460][T12296] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 871.961435][T12296] CPU: 0 PID: 12296 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 871.969477][T12296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.979625][T12296] Call Trace: [ 871.983013][T12296] dump_stack+0x191/0x1f0 [ 871.987451][T12296] dump_header+0x1e7/0xd00 [ 871.991964][T12296] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 871.998195][T12296] ? ___ratelimit+0x542/0x720 [ 872.003210][T12296] ? task_will_free_mem+0x2c9/0x810 [ 872.008505][T12296] oom_kill_process+0x210/0x560 [ 872.013542][T12296] out_of_memory+0x16cf/0x1c20 [ 872.018394][T12296] try_charge+0x2889/0x3d70 [ 872.022973][T12296] ? __wake_up_common+0x41b/0x9f0 [ 872.028112][T12296] mem_cgroup_try_charge+0xa29/0xe40 [ 872.033479][T12296] mem_cgroup_try_charge_delay+0x7e/0x140 [ 872.039279][T12296] wp_page_copy+0x776/0x26d0 [ 872.043930][T12296] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 872.050068][T12296] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 872.056333][T12296] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 872.062393][T12296] do_wp_page+0x1fc2/0x3670 [ 872.066992][T12296] handle_mm_fault+0x46d8/0x9f00 [ 872.072050][T12296] do_user_addr_fault+0x905/0x1510 [ 872.077370][T12296] __do_page_fault+0x1a2/0x410 [ 872.082219][T12296] do_page_fault+0xbb/0x500 [ 872.086966][T12296] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 872.092433][T12296] page_fault+0x4e/0x60 [ 872.096640][T12296] RIP: 0033:0x4718f3 [ 872.100600][T12296] Code: 00 4c 89 e7 89 8d 50 fb ff ff 45 31 ff 48 89 85 a8 fb ff ff 48 8b 42 08 48 89 85 b0 fb ff ff 48 8b 42 10 48 89 85 b8 fb ff ff 48 05 fd ff 8b 8d 50 fb ff ff 49 89 c6 48 89 85 68 fb ff ff 80 [ 872.120276][T12296] RSP: 002b:0000000000a6cfc0 EFLAGS: 00010246 [ 872.126427][T12296] RAX: 0000000000a6fbf0 RBX: 0000000000a6d540 RCX: 00000000fbad8004 [ 872.134455][T12296] RDX: 0000000000a6fbd8 RSI: 0000000000000025 RDI: 00000000004be164 [ 872.142481][T12296] RBP: 0000000000a6d510 R08: 000055555640f940 R09: 000000000000000c [ 872.150511][T12296] R10: 00000000004be164 R11: 0000000000000246 R12: 00000000004be164 [ 872.158535][T12296] R13: 0000000000a6fbd8 R14: 0000000000000000 R15: 0000000000000000 [ 872.168462][T12296] memory: usage 5228kB, limit 0kB, failcnt 85 [ 872.175147][T12296] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 872.183062][T12296] Memory cgroup stats for /syz0: [ 872.183424][T12296] anon 1126400 [ 872.183424][T12296] file 110592 [ 872.183424][T12296] kernel_stack 655360 [ 872.183424][T12296] slab 2170880 [ 872.183424][T12296] sock 69632 [ 872.183424][T12296] shmem 0 [ 872.183424][T12296] file_mapped 0 [ 872.183424][T12296] file_dirty 0 [ 872.183424][T12296] file_writeback 0 [ 872.183424][T12296] anon_thp 0 [ 872.183424][T12296] inactive_anon 135168 [ 872.183424][T12296] active_anon 1220608 [ 872.183424][T12296] inactive_file 0 [ 872.183424][T12296] active_file 0 [ 872.183424][T12296] unevictable 135168 [ 872.183424][T12296] slab_reclaimable 270336 [ 872.183424][T12296] slab_unreclaimable 1900544 [ 872.183424][T12296] pgfault 70389 [ 872.183424][T12296] pgmajfault 0 [ 872.183424][T12296] workingset_refault 0 [ 872.183424][T12296] workingset_activate 0 [ 872.183424][T12296] workingset_nodereclaim 0 [ 872.183424][T12296] pgrefill 0 [ 872.183424][T12296] pgscan 0 [ 872.183424][T12296] pgsteal 0 [ 872.183424][T12296] pgactivate 0 [ 872.278826][T12296] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=16317,uid=0 [ 872.294635][T12296] Memory cgroup out of memory: Killed process 16317 (syz-executor.0) total-vm:72708kB, anon-rss:172kB, file-rss:35788kB, shmem-rss:0kB [ 872.310487][ T1822] oom_reaper: reaped process 16317 (syz-executor.0), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 872.318000][T12296] Memory cgroup out of memory: Killed process 21821 (syz-executor.0) total-vm:72576kB, anon-rss:168kB, file-rss:35780kB, shmem-rss:0kB [ 872.338108][ T1822] oom_reaper: reaped process 21821 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 872.353990][T12296] Memory cgroup out of memory: Killed process 21711 (syz-executor.0) total-vm:72576kB, anon-rss:168kB, file-rss:35780kB, shmem-rss:0kB [ 872.396082][ T1822] oom_reaper: reaped process 21711 (syz-executor.0), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 872.411936][T12296] Memory cgroup out of memory: Killed process 12296 (syz-executor.0) total-vm:72444kB, anon-rss:120kB, file-rss:35776kB, shmem-rss:0kB [ 872.460549][ T1822] oom_reaper: reaped process 12296 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 872.744530][T28943] Memory cgroup out of memory: Killed process 21645 (syz-executor.4) total-vm:72708kB, anon-rss:2208kB, file-rss:35784kB, shmem-rss:0kB [ 872.762495][T28943] Memory cgroup out of memory: Killed process 21664 (syz-executor.4) total-vm:72576kB, anon-rss:2200kB, file-rss:35788kB, shmem-rss:0kB [ 872.762773][ T1822] oom_reaper: reaped process 21645 (syz-executor.4), now anon-rss:0kB, file-rss:34824kB, shmem-rss:0kB [ 872.860850][ T1822] oom_reaper: reaped process 21664 (syz-executor.4), now anon-rss:0kB, file-rss:34828kB, shmem-rss:0kB [ 872.872657][T28943] Memory cgroup out of memory: Killed process 20245 (syz-executor.4) total-vm:72708kB, anon-rss:2208kB, file-rss:35780kB, shmem-rss:0kB [ 872.916483][ T1822] oom_reaper: reaped process 20245 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 872.928215][T28943] Memory cgroup out of memory: Killed process 15478 (syz-executor.4) total-vm:72708kB, anon-rss:2200kB, file-rss:35784kB, shmem-rss:0kB [ 873.013209][T28943] oom_kill_process: 7 callbacks suppressed [ 873.013405][T28943] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 873.030711][T28943] CPU: 0 PID: 28943 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 873.038759][T28943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.048867][T28943] Call Trace: [ 873.052245][T28943] dump_stack+0x191/0x1f0 [ 873.056664][T28943] dump_header+0x1e7/0xd00 [ 873.061160][T28943] ? _raw_spin_unlock_irqrestore+0x4b/0x70 [ 873.067034][T28943] ? ___ratelimit+0x542/0x720 [ 873.071773][T28943] ? task_will_free_mem+0x14c/0x810 [ 873.077048][T28943] oom_kill_process+0x210/0x560 [ 873.082001][T28943] out_of_memory+0x16cf/0x1c20 [ 873.086939][T28943] memory_max_write+0x90b/0xb60 [ 873.091885][T28943] ? memory_max_show+0x1b0/0x1b0 [ 873.096883][T28943] cgroup_file_write+0x41a/0x8e0 [ 873.101911][T28943] ? cgroup_seqfile_stop+0x150/0x150 [ 873.107263][T28943] kernfs_fop_write+0x55f/0x840 [ 873.112202][T28943] ? kernfs_fop_read+0x9a0/0x9a0 [ 873.117214][T28943] __vfs_write+0x1a9/0xcb0 [ 873.121716][T28943] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 873.127835][T28943] ? __sb_start_write+0x10b/0x230 [ 873.132925][T28943] vfs_write+0x481/0x920 [ 873.137247][T28943] ksys_write+0x265/0x430 [ 873.141662][T28943] __se_sys_write+0x92/0xb0 [ 873.146265][T28943] __x64_sys_write+0x4a/0x70 [ 873.150936][T28943] do_syscall_64+0xbc/0xf0 [ 873.155437][T28943] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 873.161405][T28943] RIP: 0033:0x459829 [ 873.165837][T28943] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.185503][T28943] RSP: 002b:00007fedca077c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 873.194092][T28943] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 873.202135][T28943] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 873.210157][T28943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 873.219235][T28943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fedca0786d4 [ 873.228253][T28943] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 873.237953][T28943] memory: usage 8156kB, limit 0kB, failcnt 0 [ 873.244421][T28943] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 873.251399][T28943] Memory cgroup stats for /syz4: [ 873.253991][T28943] anon 3293184 [ 873.253991][T28943] file 69632 [ 873.253991][T28943] kernel_stack 983040 [ 873.253991][T28943] slab 1904640 [ 873.253991][T28943] sock 106496 [ 873.253991][T28943] shmem 40960 [ 873.253991][T28943] file_mapped 0 [ 873.253991][T28943] file_dirty 0 [ 873.253991][T28943] file_writeback 0 [ 873.253991][T28943] anon_thp 2097152 [ 873.253991][T28943] inactive_anon 0 [ 873.253991][T28943] active_anon 3293184 [ 873.253991][T28943] inactive_file 0 [ 873.253991][T28943] active_file 0 [ 873.253991][T28943] unevictable 0 [ 873.253991][T28943] slab_reclaimable 139264 [ 873.253991][T28943] slab_unreclaimable 1765376 [ 873.253991][T28943] pgfault 46299 [ 873.253991][T28943] pgmajfault 0 [ 873.253991][T28943] workingset_refault 0 [ 873.253991][T28943] workingset_activate 0 [ 873.253991][T28943] workingset_nodereclaim 0 [ 873.253991][T28943] pgrefill 0 [ 873.253991][T28943] pgscan 0 [ 873.253991][T28943] pgsteal 0 [ 873.253991][T28943] pgactivate 0 [ 873.350478][T28943] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=28941,uid=0 [ 873.367401][T28943] Memory cgroup out of memory: Killed process 28941 (syz-executor.4) total-vm:72708kB, anon-rss:2156kB, file-rss:34816kB, shmem-rss:0kB [ 873.416656][ T1822] oom_reaper: reaped process 28941 (syz-executor.4), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB 02:59:42 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) futex(&(0x7f0000000040)=0x2, 0x81, 0xc2c, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0), 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 02:59:42 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f0000220100"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 02:59:42 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000480)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0863104000000000000000000000000001000000"], 0xfffffe61, 0x0, 0x0}) [ 873.568592][T28951] debugfs: File '28948' in directory 'proc' already present! [ 873.595675][T28951] binder: 28948:28951 ioctl c018620b 0 returned -14 [ 873.606708][T28951] binder: 28948:28951 ioctl c0306201 200002c0 returned -14 02:59:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = open(&(0x7f0000000200)='./file1\x00', 0x10000000080040, 0x0) fcntl$setlease(r1, 0x400, 0x0) close(r1) 02:59:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000008540)={0x0, 0x0, 0x0}, 0x0) 02:59:43 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r9 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r9, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) [ 874.140733][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 874.151012][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 874.159053][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.170062][T13300] Call Trace: [ 874.173448][T13300] dump_stack+0x191/0x1f0 [ 874.177885][T13300] dump_header+0x1e7/0xd00 [ 874.182388][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 874.191924][T13300] ? ___ratelimit+0x542/0x720 [ 874.196698][T13300] ? task_will_free_mem+0x2c9/0x810 [ 874.202013][T13300] oom_kill_process+0x210/0x560 [ 874.206981][T13300] out_of_memory+0x16cf/0x1c20 [ 874.211846][T13300] try_charge+0x2889/0x3d70 [ 874.216513][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 874.221914][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 874.227740][T13300] wp_page_copy+0x776/0x26d0 [ 874.232408][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 874.238474][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 874.244733][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 874.250806][T13300] do_wp_page+0x1fc2/0x3670 [ 874.255434][T13300] handle_mm_fault+0x46d8/0x9f00 [ 874.260511][T13300] do_user_addr_fault+0x905/0x1510 [ 874.265759][T13300] __do_page_fault+0x1a2/0x410 [ 874.270624][T13300] do_page_fault+0xbb/0x500 [ 874.276007][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 874.281472][T13300] page_fault+0x4e/0x60 [ 874.285862][T13300] RIP: 0033:0x4743ed [ 874.289827][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 874.309487][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 874.315647][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 874.323678][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 874.331718][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 874.339750][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 874.347793][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 874.356945][T13300] memory: usage 4880kB, limit 0kB, failcnt 20 [ 874.363178][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 874.370062][T13300] Memory cgroup stats for /syz4: [ 874.370417][T13300] anon 1097728 [ 874.370417][T13300] file 69632 [ 874.370417][T13300] kernel_stack 524288 [ 874.370417][T13300] slab 1904640 [ 874.370417][T13300] sock 106496 [ 874.370417][T13300] shmem 40960 [ 874.370417][T13300] file_mapped 0 [ 874.370417][T13300] file_dirty 0 [ 874.370417][T13300] file_writeback 0 [ 874.370417][T13300] anon_thp 0 [ 874.370417][T13300] inactive_anon 0 [ 874.370417][T13300] active_anon 1097728 [ 874.370417][T13300] inactive_file 0 [ 874.370417][T13300] active_file 0 [ 874.370417][T13300] unevictable 0 [ 874.370417][T13300] slab_reclaimable 139264 [ 874.370417][T13300] slab_unreclaimable 1765376 [ 874.370417][T13300] pgfault 46332 [ 874.370417][T13300] pgmajfault 0 [ 874.370417][T13300] workingset_refault 0 [ 874.370417][T13300] workingset_activate 0 [ 874.370417][T13300] workingset_nodereclaim 0 [ 874.370417][T13300] pgrefill 0 [ 874.370417][T13300] pgscan 0 [ 874.370417][T13300] pgsteal 0 [ 874.370417][T13300] pgactivate 0 [ 874.465272][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=27818,uid=0 [ 874.481414][T13300] Memory cgroup out of memory: Killed process 27818 (syz-executor.4) total-vm:72708kB, anon-rss:164kB, file-rss:35780kB, shmem-rss:0kB [ 874.505186][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 874.515250][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 874.523282][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.533386][T13300] Call Trace: [ 874.536770][T13300] dump_stack+0x191/0x1f0 02:59:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000004, 0x80000000) [ 874.541188][T13300] dump_header+0x1e7/0xd00 [ 874.543348][ T1822] oom_reaper: reaped process 27818 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 874.545702][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 874.562925][T13300] ? ___ratelimit+0x542/0x720 [ 874.567681][T13300] ? task_will_free_mem+0x2c9/0x810 [ 874.572970][T13300] oom_kill_process+0x210/0x560 [ 874.577996][T13300] out_of_memory+0x16cf/0x1c20 [ 874.582854][T13300] try_charge+0x2889/0x3d70 02:59:43 executing program 0: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x10, &(0x7f0000000900)={&(0x7f0000000980)=""/67, 0x43, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=r3, 0x4) r4 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r4, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000", 0x30}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x2, 0xfffffffffffffff8, 0x2, 0x10, r2, 0x1d74, [], 0x0, 0xffffffffffffff9c, 0x3, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r5, 0x0, 0x0, 0x7}, 0xfffffffffffffef7) r6 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r7 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r7, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000018c0)="f4001100002b2c25e994efd18498d66205baa68754a3000000000200000000000000000000ffffff8400000000000000c00195c1e2d4f32ebdbed8280238dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffe45) socket$kcm(0x11, 0x0, 0x0) r8 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0x0, 0x0, 0x0, 0x0}, 0x20) r9 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r9, &(0x7f0000000540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0}, 0x24000001) write$cgroup_int(r8, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000880)={&(0x7f0000000280)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/44, 0x2c}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/21, 0x15}, {&(0x7f0000000580)=""/198, 0xc6}, {&(0x7f0000000480)=""/48, 0x30}, {&(0x7f00000004c0)=""/45, 0x2d}, {&(0x7f0000000680)=""/237, 0xed}, {&(0x7f0000000500)=""/35, 0x23}, {&(0x7f0000000780)=""/43, 0x2b}], 0xa}, 0x40002021) [ 874.587564][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 874.592951][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 874.598760][T13300] wp_page_copy+0x776/0x26d0 [ 874.603419][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 874.609472][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 874.615722][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 874.621790][T13300] do_wp_page+0x1fc2/0x3670 [ 874.626378][T13300] handle_mm_fault+0x46d8/0x9f00 [ 874.631426][T13300] do_user_addr_fault+0x905/0x1510 [ 874.636638][T13300] __do_page_fault+0x1a2/0x410 [ 874.641466][T13300] do_page_fault+0xbb/0x500 [ 874.646044][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 874.651492][T13300] page_fault+0x4e/0x60 [ 874.655701][T13300] RIP: 0033:0x4743ed [ 874.659658][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 874.679417][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 874.685551][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 874.693593][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 874.701622][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 874.709637][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 874.717652][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 874.725933][T13300] memory: usage 4752kB, limit 0kB, failcnt 26 [ 874.732116][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 02:59:43 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f0000220100"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 874.738985][T13300] Memory cgroup stats for /syz4: [ 874.739339][T13300] anon 1097728 [ 874.739339][T13300] file 69632 [ 874.739339][T13300] kernel_stack 524288 [ 874.739339][T13300] slab 1904640 [ 874.739339][T13300] sock 106496 [ 874.739339][T13300] shmem 40960 [ 874.739339][T13300] file_mapped 0 [ 874.739339][T13300] file_dirty 0 [ 874.739339][T13300] file_writeback 0 [ 874.739339][T13300] anon_thp 0 [ 874.739339][T13300] inactive_anon 0 [ 874.739339][T13300] active_anon 1097728 [ 874.739339][T13300] inactive_file 0 [ 874.739339][T13300] active_file 0 [ 874.739339][T13300] unevictable 0 [ 874.739339][T13300] slab_reclaimable 139264 [ 874.739339][T13300] slab_unreclaimable 1765376 [ 874.739339][T13300] pgfault 46332 [ 874.739339][T13300] pgmajfault 0 [ 874.739339][T13300] workingset_refault 0 [ 874.739339][T13300] workingset_activate 0 [ 874.739339][T13300] workingset_nodereclaim 0 [ 874.739339][T13300] pgrefill 0 [ 874.739339][T13300] pgscan 0 [ 874.739339][T13300] pgsteal 0 [ 874.739339][T13300] pgactivate 0 [ 874.834419][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=21697,uid=0 [ 874.850145][T13300] Memory cgroup out of memory: Killed process 21697 (syz-executor.4) total-vm:72708kB, anon-rss:164kB, file-rss:35780kB, shmem-rss:0kB [ 874.866231][ T1822] oom_reaper: reaped process 21697 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 874.873642][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 874.887353][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 874.895379][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.905585][T13300] Call Trace: [ 874.908975][T13300] dump_stack+0x191/0x1f0 [ 874.913409][T13300] dump_header+0x1e7/0xd00 [ 874.917903][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 874.924220][T13300] ? ___ratelimit+0x542/0x720 [ 874.928961][T13300] ? task_will_free_mem+0x2c9/0x810 [ 874.934264][T13300] oom_kill_process+0x210/0x560 [ 874.939201][T13300] out_of_memory+0x16cf/0x1c20 [ 874.944047][T13300] try_charge+0x2889/0x3d70 [ 874.948690][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 874.954158][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 874.960069][T13300] wp_page_copy+0x776/0x26d0 [ 874.964739][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 874.970803][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 874.977051][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 874.983107][T13300] do_wp_page+0x1fc2/0x3670 [ 874.987697][T13300] handle_mm_fault+0x46d8/0x9f00 [ 874.992752][T13300] do_user_addr_fault+0x905/0x1510 [ 874.997970][T13300] __do_page_fault+0x1a2/0x410 [ 875.002816][T13300] do_page_fault+0xbb/0x500 [ 875.007393][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 875.012864][T13300] page_fault+0x4e/0x60 [ 875.017062][T13300] RIP: 0033:0x4743ed [ 875.021022][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 875.040965][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 875.047106][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 875.055141][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 875.063207][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 875.071347][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 875.079373][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 875.087586][T13300] memory: usage 4620kB, limit 0kB, failcnt 32 [ 875.093767][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 875.100661][T13300] Memory cgroup stats for /syz4: [ 875.100985][T13300] anon 937984 [ 875.100985][T13300] file 69632 [ 875.100985][T13300] kernel_stack 524288 [ 875.100985][T13300] slab 1904640 [ 875.100985][T13300] sock 106496 [ 875.100985][T13300] shmem 40960 [ 875.100985][T13300] file_mapped 0 [ 875.100985][T13300] file_dirty 0 [ 875.100985][T13300] file_writeback 0 [ 875.100985][T13300] anon_thp 0 [ 875.100985][T13300] inactive_anon 0 [ 875.100985][T13300] active_anon 962560 [ 875.100985][T13300] inactive_file 0 [ 875.100985][T13300] active_file 0 [ 875.100985][T13300] unevictable 0 [ 875.100985][T13300] slab_reclaimable 139264 [ 875.100985][T13300] slab_unreclaimable 1765376 [ 875.100985][T13300] pgfault 46332 [ 875.100985][T13300] pgmajfault 0 [ 875.100985][T13300] workingset_refault 0 [ 875.100985][T13300] workingset_activate 0 [ 875.100985][T13300] workingset_nodereclaim 0 [ 875.100985][T13300] pgrefill 0 [ 875.100985][T13300] pgscan 0 [ 875.100985][T13300] pgsteal 0 [ 875.100985][T13300] pgactivate 0 [ 875.195788][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=26925,uid=0 [ 875.211688][T13300] Memory cgroup out of memory: Killed process 26925 (syz-executor.4) total-vm:72576kB, anon-rss:156kB, file-rss:35780kB, shmem-rss:0kB [ 875.227758][ T1822] oom_reaper: reaped process 26925 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 875.235192][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 875.248877][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 875.256920][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.267037][T13300] Call Trace: [ 875.270422][T13300] dump_stack+0x191/0x1f0 [ 875.276364][T13300] dump_header+0x1e7/0xd00 [ 875.280850][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 875.287069][T13300] ? ___ratelimit+0x542/0x720 [ 875.291816][T13300] ? task_will_free_mem+0x2c9/0x810 [ 875.297110][T13300] oom_kill_process+0x210/0x560 [ 875.302062][T13300] out_of_memory+0x16cf/0x1c20 [ 875.306907][T13300] try_charge+0x2889/0x3d70 [ 875.311546][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 875.317016][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 875.323565][T13300] wp_page_copy+0x776/0x26d0 [ 875.328219][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 875.334270][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 875.340521][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 875.346596][T13300] do_wp_page+0x1fc2/0x3670 [ 875.351275][T13300] handle_mm_fault+0x46d8/0x9f00 [ 875.356310][T13300] do_user_addr_fault+0x905/0x1510 [ 875.361505][T13300] __do_page_fault+0x1a2/0x410 [ 875.366348][T13300] do_page_fault+0xbb/0x500 [ 875.370926][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 875.376374][T13300] page_fault+0x4e/0x60 [ 875.380571][T13300] RIP: 0033:0x4743ed [ 875.384542][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 875.404208][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 875.410351][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 875.418395][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 875.426426][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 875.434452][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 875.442484][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 875.450707][T13300] memory: usage 4288kB, limit 0kB, failcnt 38 [ 875.456953][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 875.463959][T13300] Memory cgroup stats for /syz4: [ 875.464309][T13300] anon 802816 [ 875.464309][T13300] file 69632 [ 875.464309][T13300] kernel_stack 458752 [ 875.464309][T13300] slab 1904640 [ 875.464309][T13300] sock 106496 [ 875.464309][T13300] shmem 40960 [ 875.464309][T13300] file_mapped 0 [ 875.464309][T13300] file_dirty 0 [ 875.464309][T13300] file_writeback 0 [ 875.464309][T13300] anon_thp 0 [ 875.464309][T13300] inactive_anon 0 [ 875.464309][T13300] active_anon 827392 [ 875.464309][T13300] inactive_file 0 [ 875.464309][T13300] active_file 0 [ 875.464309][T13300] unevictable 0 [ 875.464309][T13300] slab_reclaimable 139264 [ 875.464309][T13300] slab_unreclaimable 1765376 [ 875.464309][T13300] pgfault 46332 [ 875.464309][T13300] pgmajfault 0 [ 875.464309][T13300] workingset_refault 0 [ 875.464309][T13300] workingset_activate 0 [ 875.464309][T13300] workingset_nodereclaim 0 [ 875.464309][T13300] pgrefill 0 [ 875.464309][T13300] pgscan 0 [ 875.464309][T13300] pgsteal 0 [ 875.464309][T13300] pgactivate 0 [ 875.560531][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=20199,uid=0 [ 875.576249][T13300] Memory cgroup out of memory: Killed process 20199 (syz-executor.4) total-vm:72576kB, anon-rss:156kB, file-rss:35780kB, shmem-rss:0kB [ 875.592736][ T1822] oom_reaper: reaped process 20199 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 875.608734][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 875.618851][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 875.626891][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.637268][T13300] Call Trace: [ 875.640652][T13300] dump_stack+0x191/0x1f0 [ 875.645068][T13300] dump_header+0x1e7/0xd00 [ 875.649579][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 875.655814][T13300] ? ___ratelimit+0x542/0x720 [ 875.660586][T13300] ? task_will_free_mem+0x2c9/0x810 [ 875.665883][T13300] oom_kill_process+0x210/0x560 [ 875.670844][T13300] out_of_memory+0x16cf/0x1c20 [ 875.675713][T13300] try_charge+0x2889/0x3d70 [ 875.680355][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 875.685734][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 875.691552][T13300] wp_page_copy+0x776/0x26d0 [ 875.696224][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 875.702283][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 875.708523][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 875.714597][T13300] do_wp_page+0x1fc2/0x3670 [ 875.719286][T13300] handle_mm_fault+0x46d8/0x9f00 [ 875.724369][T13300] do_user_addr_fault+0x905/0x1510 [ 875.729601][T13300] __do_page_fault+0x1a2/0x410 [ 875.734452][T13300] do_page_fault+0xbb/0x500 [ 875.739027][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 875.744483][T13300] page_fault+0x4e/0x60 [ 875.748690][T13300] RIP: 0033:0x4743ed [ 875.752652][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 875.772322][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 875.778456][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 875.786493][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 875.794523][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 875.802566][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 875.810620][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 875.818880][T13300] memory: usage 3968kB, limit 0kB, failcnt 50 [ 875.825083][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 875.832092][T13300] Memory cgroup stats for /syz4: [ 875.832394][T13300] anon 647168 [ 875.832394][T13300] file 69632 [ 875.832394][T13300] kernel_stack 393216 [ 875.832394][T13300] slab 1904640 [ 875.832394][T13300] sock 106496 [ 875.832394][T13300] shmem 40960 [ 875.832394][T13300] file_mapped 0 [ 875.832394][T13300] file_dirty 0 [ 875.832394][T13300] file_writeback 0 [ 875.832394][T13300] anon_thp 0 [ 875.832394][T13300] inactive_anon 0 [ 875.832394][T13300] active_anon 692224 [ 875.832394][T13300] inactive_file 0 [ 875.832394][T13300] active_file 0 [ 875.832394][T13300] unevictable 0 [ 875.832394][T13300] slab_reclaimable 139264 [ 875.832394][T13300] slab_unreclaimable 1765376 [ 875.832394][T13300] pgfault 46332 [ 875.832394][T13300] pgmajfault 0 [ 875.832394][T13300] workingset_refault 0 [ 875.832394][T13300] workingset_activate 0 [ 875.832394][T13300] workingset_nodereclaim 0 [ 875.832394][T13300] pgrefill 0 [ 875.832394][T13300] pgscan 0 [ 875.832394][T13300] pgsteal 0 [ 875.832394][T13300] pgactivate 0 [ 875.927876][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=19543,uid=0 [ 875.944167][T13300] Memory cgroup out of memory: Killed process 19543 (syz-executor.4) total-vm:72576kB, anon-rss:156kB, file-rss:35780kB, shmem-rss:0kB [ 875.959916][ T1822] oom_reaper: reaped process 19543 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 875.967791][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 875.981067][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 875.989105][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.999503][T13300] Call Trace: [ 876.002877][T13300] dump_stack+0x191/0x1f0 [ 876.007291][T13300] dump_header+0x1e7/0xd00 [ 876.011775][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 876.018097][T13300] ? ___ratelimit+0x542/0x720 [ 876.022876][T13300] ? task_will_free_mem+0x2c9/0x810 [ 876.028167][T13300] oom_kill_process+0x210/0x560 [ 876.033121][T13300] out_of_memory+0x16cf/0x1c20 [ 876.037986][T13300] try_charge+0x2889/0x3d70 [ 876.042648][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 876.048047][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 876.053861][T13300] wp_page_copy+0x776/0x26d0 [ 876.058525][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 876.064605][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 876.070885][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 876.076961][T13300] do_wp_page+0x1fc2/0x3670 [ 876.081596][T13300] handle_mm_fault+0x46d8/0x9f00 [ 876.086871][T13300] do_user_addr_fault+0x905/0x1510 [ 876.092131][T13300] __do_page_fault+0x1a2/0x410 [ 876.096987][T13300] do_page_fault+0xbb/0x500 [ 876.101597][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 876.107071][T13300] page_fault+0x4e/0x60 [ 876.111295][T13300] RIP: 0033:0x4743ed [ 876.115276][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 876.134951][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 876.141087][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 876.149122][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 876.157244][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 876.166240][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 876.174272][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 876.182483][T13300] memory: usage 3440kB, limit 0kB, failcnt 56 [ 876.188644][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 876.195655][T13300] Memory cgroup stats for /syz4: [ 876.195994][T13300] anon 507904 [ 876.195994][T13300] file 69632 [ 876.195994][T13300] kernel_stack 262144 [ 876.195994][T13300] slab 1904640 [ 876.195994][T13300] sock 106496 [ 876.195994][T13300] shmem 40960 [ 876.195994][T13300] file_mapped 0 [ 876.195994][T13300] file_dirty 0 [ 876.195994][T13300] file_writeback 0 [ 876.195994][T13300] anon_thp 0 [ 876.195994][T13300] inactive_anon 0 [ 876.195994][T13300] active_anon 557056 [ 876.195994][T13300] inactive_file 0 [ 876.195994][T13300] active_file 0 [ 876.195994][T13300] unevictable 0 [ 876.195994][T13300] slab_reclaimable 139264 [ 876.195994][T13300] slab_unreclaimable 1765376 [ 876.195994][T13300] pgfault 46332 [ 876.195994][T13300] pgmajfault 0 [ 876.195994][T13300] workingset_refault 0 [ 876.195994][T13300] workingset_activate 0 [ 876.195994][T13300] workingset_nodereclaim 0 [ 876.195994][T13300] pgrefill 0 [ 876.195994][T13300] pgscan 0 [ 876.195994][T13300] pgsteal 0 [ 876.195994][T13300] pgactivate 0 [ 876.295315][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=16444,uid=0 [ 876.311155][T13300] Memory cgroup out of memory: Killed process 16444 (syz-executor.4) total-vm:72708kB, anon-rss:156kB, file-rss:35780kB, shmem-rss:0kB [ 876.326972][ T1822] oom_reaper: reaped process 16444 (syz-executor.4), now anon-rss:0kB, file-rss:34820kB, shmem-rss:0kB [ 876.334978][T13300] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 876.348178][T13300] CPU: 1 PID: 13300 Comm: syz-executor.4 Not tainted 5.3.0-rc3+ #17 [ 876.356204][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.366310][T13300] Call Trace: [ 876.369703][T13300] dump_stack+0x191/0x1f0 [ 876.374225][T13300] dump_header+0x1e7/0xd00 [ 876.378735][T13300] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 876.384962][T13300] ? ___ratelimit+0x542/0x720 [ 876.389710][T13300] ? task_will_free_mem+0x2c9/0x810 [ 876.395011][T13300] oom_kill_process+0x210/0x560 [ 876.399958][T13300] out_of_memory+0x16cf/0x1c20 [ 876.404811][T13300] try_charge+0x2889/0x3d70 [ 876.409448][T13300] mem_cgroup_try_charge+0xa29/0xe40 [ 876.414809][T13300] mem_cgroup_try_charge_delay+0x7e/0x140 [ 876.420614][T13300] wp_page_copy+0x776/0x26d0 [ 876.425282][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 876.431357][T13300] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 876.437607][T13300] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 876.443669][T13300] do_wp_page+0x1fc2/0x3670 [ 876.448276][T13300] handle_mm_fault+0x46d8/0x9f00 [ 876.453333][T13300] do_user_addr_fault+0x905/0x1510 [ 876.458551][T13300] __do_page_fault+0x1a2/0x410 [ 876.463409][T13300] do_page_fault+0xbb/0x500 [ 876.467993][T13300] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 876.473443][T13300] page_fault+0x4e/0x60 [ 876.477645][T13300] RIP: 0033:0x4743ed [ 876.481614][T13300] Code: 54 55 53 48 81 ec 28 21 00 00 8b 8f c0 00 00 00 85 c9 0f 85 4d 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 01 00 00 <48> 89 bc 24 00 01 00 00 48 89 fb 41 bd 00 00 00 00 c7 84 24 e0 00 [ 876.501282][T13300] RSP: 002b:0000000000a6d5f0 EFLAGS: 00010246 [ 876.507425][T13300] RAX: 0000000000a6d710 RBX: 0000000000714f20 RCX: 00000000ffffffff [ 876.515480][T13300] RDX: 0000000000a6fcc0 RSI: 00000000004bf073 RDI: 0000000000714f20 [ 876.523507][T13300] RBP: 0000000000a6fc90 R08: 0000000000a74ef0 R09: 00000000004bf073 [ 876.531541][T13300] R10: 0000555555e3d940 R11: 0000000000000246 R12: 00000000004bf073 [ 876.539674][T13300] R13: 0000000000a6fcc0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 876.547885][T13300] memory: usage 3108kB, limit 0kB, failcnt 62 [ 876.554110][T13300] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 876.561002][T13300] Memory cgroup stats for /syz4: [ 876.561362][T13300] anon 372736 [ 876.561362][T13300] file 69632 [ 876.561362][T13300] kernel_stack 196608 [ 876.561362][T13300] slab 1904640 [ 876.561362][T13300] sock 106496 [ 876.561362][T13300] shmem 40960 [ 876.561362][T13300] file_mapped 0 [ 876.561362][T13300] file_dirty 0 [ 876.561362][T13300] file_writeback 0 [ 876.561362][T13300] anon_thp 0 [ 876.561362][T13300] inactive_anon 0 [ 876.561362][T13300] active_anon 421888 [ 876.561362][T13300] inactive_file 0 [ 876.561362][T13300] active_file 0 [ 876.561362][T13300] unevictable 0 [ 876.561362][T13300] slab_reclaimable 139264 [ 876.561362][T13300] slab_unreclaimable 1765376 [ 876.561362][T13300] pgfault 46332 [ 876.561362][T13300] pgmajfault 0 [ 876.561362][T13300] workingset_refault 0 [ 876.561362][T13300] workingset_activate 0 [ 876.561362][T13300] workingset_nodereclaim 0 [ 876.561362][T13300] pgrefill 0 [ 876.561362][T13300] pgscan 0 [ 876.561362][T13300] pgsteal 0 [ 876.561362][T13300] pgactivate 0 [ 876.656264][T13300] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=13300,uid=0 [ 876.671928][T13300] Memory cgroup out of memory: Killed process 13300 (syz-executor.4) total-vm:72444kB, anon-rss:108kB, file-rss:35776kB, shmem-rss:0kB [ 876.687703][ T1822] oom_reaper: reaped process 13300 (syz-executor.4), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 02:59:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/152, 0x98}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) socketpair(0x17, 0x0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r1, 0x0) 02:59:46 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 02:59:46 executing program 5: r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x172, &(0x7f00000000c0)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001480)=""/4096, 0xfe87}], 0x1, 0x0, 0x72}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffde}, 0x0) [ 877.542618][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 877.549089][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:59:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 02:59:46 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:46 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) dup2(r1, r0) 02:59:47 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:47 executing program 5: r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x172, &(0x7f00000000c0)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000001480)=""/4096, 0xfe87}], 0x1, 0x0, 0x72}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffde}, 0x0) 02:59:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="24000000210007031dfffd940101830020200a000900000006000000000000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f", 0x4a}], 0x1}, 0x0) 02:59:47 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 879.081328][T29016] IPVS: ftp: loaded support on port[0] = 21 [ 879.232269][T12651] device bridge_slave_1 left promiscuous mode [ 879.238948][T12651] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.273650][T12651] device bridge_slave_0 left promiscuous mode [ 879.280646][T12651] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.132944][T12651] device hsr_slave_0 left promiscuous mode [ 880.212265][T12651] device hsr_slave_1 left promiscuous mode [ 880.318246][T29019] IPVS: ftp: loaded support on port[0] = 21 [ 880.345978][T12651] team0 (unregistering): Port device team_slave_1 removed [ 880.359205][T12651] team0 (unregistering): Port device team_slave_0 removed [ 880.372487][T12651] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 880.419064][T12651] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 880.508935][T12651] bond0 (unregistering): Released all slaves [ 880.604461][T29016] chnl_net:caif_netlink_parms(): no params data found [ 880.681313][T29016] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.688665][T29016] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.697897][T29016] device bridge_slave_0 entered promiscuous mode [ 880.708497][T29016] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.715925][T29016] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.725155][T29016] device bridge_slave_1 entered promiscuous mode [ 880.800616][T29016] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 880.820936][T29016] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 880.923870][T29016] team0: Port device team_slave_0 added [ 880.930309][T29019] chnl_net:caif_netlink_parms(): no params data found [ 880.946987][T29016] team0: Port device team_slave_1 added [ 881.126814][T29016] device hsr_slave_0 entered promiscuous mode [ 881.182892][T29016] device hsr_slave_1 entered promiscuous mode [ 881.278924][T29019] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.286420][T29019] bridge0: port 1(bridge_slave_0) entered disabled state [ 881.295242][T29019] device bridge_slave_0 entered promiscuous mode [ 881.306234][T29019] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.313695][T29019] bridge0: port 2(bridge_slave_1) entered disabled state [ 881.323152][T29019] device bridge_slave_1 entered promiscuous mode [ 881.364842][T29019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 881.379174][T29019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 881.433600][T29016] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.440887][T29016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 881.448967][T29016] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.456334][T29016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 881.475809][T29019] team0: Port device team_slave_0 added [ 881.499656][T29019] team0: Port device team_slave_1 added [ 881.605842][T29019] device hsr_slave_0 entered promiscuous mode [ 881.672913][T29019] device hsr_slave_1 entered promiscuous mode [ 881.712032][T29019] debugfs: Directory 'hsr0' with parent '/' already present! [ 881.725604][T12390] bridge0: port 1(bridge_slave_0) entered disabled state [ 881.735383][T12390] bridge0: port 2(bridge_slave_1) entered disabled state [ 881.837977][T29016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 881.869361][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 881.879983][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 881.900195][T29016] 8021q: adding VLAN 0 to HW filter on device team0 [ 881.924424][T12409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 881.934315][T12409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 881.944314][T12409] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.951561][T12409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 881.986354][T12409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 881.997214][T12409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 882.006531][T12409] bridge0: port 2(bridge_slave_1) entered blocking state [ 882.013767][T12409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 882.039416][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 882.159343][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 882.182931][T29019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 882.242184][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 882.252745][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 882.262682][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 882.273263][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 882.284066][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 882.298080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 882.307981][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 882.373772][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 882.383070][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 882.398794][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 882.409319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 882.464378][T29016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 882.480220][T29019] 8021q: adding VLAN 0 to HW filter on device team0 [ 882.551113][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 882.562405][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 882.572035][T12390] bridge0: port 1(bridge_slave_0) entered blocking state [ 882.579382][T12390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 882.591901][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 882.662982][T29016] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 882.676505][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 882.687657][T12390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 882.697198][T12390] bridge0: port 2(bridge_slave_1) entered blocking state [ 882.704590][T12390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 882.756551][T12651] device gretap0 left promiscuous mode [ 882.762338][T12651] bridge0: port 3(gretap0) entered disabled state [ 882.821526][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 882.833540][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 882.944921][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 882.955534][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 882.968914][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 883.061631][T29023] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 883.072107][T29023] CPU: 1 PID: 29023 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 883.080193][T29023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.090263][T29023] Call Trace: [ 883.093638][T29023] dump_stack+0x191/0x1f0 [ 883.098023][T29023] dump_header+0x1e7/0xd00 [ 883.102485][T29023] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 883.108663][T29023] ? ___ratelimit+0x542/0x720 [ 883.113384][T29023] ? task_will_free_mem+0x14c/0x810 [ 883.118620][T29023] oom_kill_process+0x210/0x560 [ 883.123528][T29023] out_of_memory+0x16cf/0x1c20 [ 883.128446][T29023] memory_max_write+0x90b/0xb60 [ 883.133355][T29023] ? memory_max_show+0x1b0/0x1b0 [ 883.138349][T29023] cgroup_file_write+0x41a/0x8e0 [ 883.143356][T29023] ? cgroup_seqfile_stop+0x150/0x150 [ 883.148685][T29023] kernfs_fop_write+0x55f/0x840 [ 883.153583][T29023] ? kernfs_fop_read+0x9a0/0x9a0 [ 883.158584][T29023] __vfs_write+0x1a9/0xcb0 [ 883.163085][T29023] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 883.169192][T29023] ? __sb_start_write+0x10b/0x230 [ 883.174375][T29023] vfs_write+0x481/0x920 [ 883.178700][T29023] ksys_write+0x265/0x430 [ 883.183130][T29023] __se_sys_write+0x92/0xb0 [ 883.187672][T29023] __x64_sys_write+0x4a/0x70 [ 883.192287][T29023] do_syscall_64+0xbc/0xf0 [ 883.196741][T29023] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 883.202701][T29023] RIP: 0033:0x459829 [ 883.206864][T29023] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 883.230591][T29023] RSP: 002b:00007f354295bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 883.239034][T29023] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 883.247040][T29023] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 883.257539][T29023] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 883.265602][T29023] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f354295c6d4 [ 883.273611][T29023] R13: 00000000004c99a3 R14: 00000000004e1028 R15: 00000000ffffffff [ 883.285186][T29023] memory: usage 4616kB, limit 0kB, failcnt 134 [ 883.291556][T29023] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 883.298697][T29023] Memory cgroup stats for /syz0: [ 883.300195][T29023] anon 2211840 [ 883.300195][T29023] file 110592 [ 883.300195][T29023] kernel_stack 196608 [ 883.300195][T29023] slab 2170880 [ 883.300195][T29023] sock 69632 [ 883.300195][T29023] shmem 0 [ 883.300195][T29023] file_mapped 0 [ 883.300195][T29023] file_dirty 0 [ 883.300195][T29023] file_writeback 0 [ 883.300195][T29023] anon_thp 2097152 [ 883.300195][T29023] inactive_anon 135168 [ 883.300195][T29023] active_anon 2224128 [ 883.300195][T29023] inactive_file 0 [ 883.300195][T29023] active_file 0 [ 883.300195][T29023] unevictable 135168 [ 883.300195][T29023] slab_reclaimable 270336 [ 883.300195][T29023] slab_unreclaimable 1900544 [ 883.300195][T29023] pgfault 70455 [ 883.300195][T29023] pgmajfault 0 [ 883.300195][T29023] workingset_refault 0 [ 883.300195][T29023] workingset_activate 0 [ 883.300195][T29023] workingset_nodereclaim 0 [ 883.300195][T29023] pgrefill 0 [ 883.300195][T29023] pgscan 0 [ 883.300195][T29023] pgsteal 0 [ 883.300195][T29023] pgactivate 0 [ 883.396299][T29023] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=29022,uid=0 [ 883.412911][T29023] Memory cgroup out of memory: Killed process 29022 (syz-executor.0) total-vm:72712kB, anon-rss:2140kB, file-rss:34816kB, shmem-rss:0kB [ 883.432591][ T1822] oom_reaper: reaped process 29022 (syz-executor.0), now anon-rss:0kB, file-rss:34852kB, shmem-rss:0kB [ 883.464838][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 883.475912][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 883.486265][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 883.495964][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 883.526096][T29019] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 883.539471][T29019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 883.574063][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 883.583871][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 883.612975][T29019] 8021q: adding VLAN 0 to HW filter on device batadv0 02:59:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000200)={[{0x0, '\x03\xa1xI?\x1e\xc2\xce\xc9`~\b\x00\xc4W\x8a\xd7\x02k\x00WeX\xcd\x02\x00\x93\xdd\x86\xdd\x00\x00\x88H\xba\b\x000\x1fr\x94\"\xadlh\x83B\xb9\xc3\x9e\x80\xac\xa4\xb1\xd8\xc4\x01v\xec\t\xb4(\x04R\xfdy\x86z?_\xa4R\x06\r)\x7f\x94\x01\xb4\xe3^\xb9\xe6\x8b\x9a\xdf\xd1xQJ\x94\x1a\xf9o\xe5@U\x16\x80\x10\x7f\xdfy\xd1\xaf\x8fNV0\x9a\xc9s=A\xcc\x0f\xf1\x19\x99\xc3\xc3t\x0f\bZ'}]}, 0x7ffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 02:59:52 executing program 5: clone(0x2a204000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x0, 0x2, 0x0) read(r1, &(0x7f0000001100)=""/53, 0x35) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) 02:59:52 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 02:59:52 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) memfd_create(0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 883.742754][T29016] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 883.752853][T29016] CPU: 1 PID: 29016 Comm: syz-executor.0 Not tainted 5.3.0-rc3+ #17 [ 883.760889][T29016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.771007][T29016] Call Trace: [ 883.774462][T29016] dump_stack+0x191/0x1f0 [ 883.778889][T29016] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 883.784976][T29016] dump_header+0x1e7/0xd00 [ 883.789494][T29016] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 883.795724][T29016] ? ___ratelimit+0x542/0x720 [ 883.800481][T29016] ? task_will_free_mem+0x2c9/0x810 [ 883.805875][T29016] oom_kill_process+0x210/0x560 [ 883.810818][T29016] out_of_memory+0x16cf/0x1c20 [ 883.815672][T29016] try_charge+0x2889/0x3d70 [ 883.820305][T29016] mem_cgroup_try_charge+0xa29/0xe40 [ 883.825668][T29016] mem_cgroup_try_charge_delay+0x7e/0x140 [ 883.831446][T29016] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 883.837523][T29016] handle_mm_fault+0x5344/0x9f00 [ 883.842595][T29016] do_user_addr_fault+0x905/0x1510 [ 883.847892][T29016] __do_page_fault+0x1a2/0x410 [ 883.852722][T29016] do_page_fault+0xbb/0x500 [ 883.857290][T29016] ? kmsan_unpoison_pt_regs+0x28/0x30 [ 883.862732][T29016] page_fault+0x4e/0x60 [ 883.867019][T29016] RIP: 0033:0x4034f2 [ 883.871004][T29016] Code: 55 41 54 49 89 fc 55 53 48 81 ec b8 10 00 00 64 48 8b 04 25 28 00 00 00 48 89 84 24 a8 10 00 00 31 c0 be 02 00 00 00 4c 89 e7 59 8d 05 00 85 c0 0f 84 00 03 00 00 4c 89 e7 e8 79 42 05 00 48 [ 883.890660][T29016] RSP: 002b:0000000000a6ecc0 EFLAGS: 00010246 [ 883.896780][T29016] RAX: 0000000000000000 RBX: 00000000000d79b0 RCX: 0000000000413430 [ 883.904798][T29016] RDX: 000000000000000c RSI: 0000000000000002 RDI: 0000000000a6fdf0 [ 883.912822][T29016] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555555cc1940 [ 883.920838][T29016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000a6fdf0 [ 883.928861][T29016] R13: 0000000000a6fde0 R14: 0000000000000000 R15: 0000000000a6fdf0 [ 883.937110][T29016] memory: usage 2144kB, limit 0kB, failcnt 142 [ 883.943405][T29016] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 883.950288][T29016] Memory cgroup stats for /syz0: [ 883.950635][T29016] anon 45056 [ 883.950635][T29016] file 110592 [ 883.950635][T29016] kernel_stack 0 [ 883.950635][T29016] slab 2170880 [ 883.950635][T29016] sock 69632 [ 883.950635][T29016] shmem 0 [ 883.950635][T29016] file_mapped 0 [ 883.950635][T29016] file_dirty 0 [ 883.950635][T29016] file_writeback 0 [ 883.950635][T29016] anon_thp 0 [ 883.950635][T29016] inactive_anon 135168 [ 883.950635][T29016] active_anon 45056 [ 883.950635][T29016] inactive_file 0 [ 883.950635][T29016] active_file 0 [ 883.950635][T29016] unevictable 135168 [ 883.950635][T29016] slab_reclaimable 270336 [ 883.950635][T29016] slab_unreclaimable 1900544 [ 883.950635][T29016] pgfault 70455 [ 883.950635][T29016] pgmajfault 0 [ 883.950635][T29016] workingset_refault 0 [ 883.950635][T29016] workingset_activate 0 [ 883.950635][T29016] workingset_nodereclaim 0 [ 883.950635][T29016] pgrefill 0 [ 883.950635][T29016] pgscan 0 [ 883.950635][T29016] pgsteal 0 [ 883.950635][T29016] pgactivate 0 [ 884.045248][T29016] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=29016,uid=0 [ 884.061003][T29016] Memory cgroup out of memory: Killed process 29016 (syz-executor.0) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB [ 884.076518][ T1822] oom_reaper: reaped process 29016 (syz-executor.0), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB [ 884.077620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 884.094052][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 884.202923][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 884.209500][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:59:53 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 884.322865][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 884.329653][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:59:53 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:53 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:53 executing program 0: r0 = socket$inet(0x10, 0x2000000000000002, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) [ 884.813343][T12651] device bridge_slave_1 left promiscuous mode [ 884.819982][T12651] bridge0: port 2(bridge_slave_1) entered disabled state 02:59:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) prctl$PR_SET_KEEPCAPS(0x8, 0x0) [ 884.933645][T12651] device bridge_slave_0 left promiscuous mode [ 884.940443][T12651] bridge0: port 1(bridge_slave_0) entered disabled state 02:59:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000100)=[{r0}, {r0}], 0x200000000000001f, 0x8020000000047) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x1c7, 0x0, 0x0, 0x800e00505) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup(r2) recvfrom$inet(r1, 0x0, 0x7760cef5, 0x40042, 0x0, 0x800e00510) shutdown(r1, 0x0) 02:59:54 executing program 0: 02:59:54 executing program 4: [ 886.873703][T12651] device hsr_slave_0 left promiscuous mode [ 886.922018][T12651] device hsr_slave_1 left promiscuous mode [ 886.985213][T12651] team0 (unregistering): Port device team_slave_1 removed [ 886.999679][T12651] team0 (unregistering): Port device team_slave_0 removed [ 887.015617][T12651] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 887.050145][T12651] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 887.130127][T12651] bond0 (unregistering): Released all slaves 02:59:56 executing program 5: 02:59:56 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) 02:59:56 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 02:59:56 executing program 4: 02:59:56 executing program 5: 02:59:56 executing program 4: 02:59:56 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0xfff) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x101}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:57 executing program 4: close(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) [ 888.022816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 888.029463][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:59:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) [ 888.477900][T29110] IPVS: ftp: loaded support on port[0] = 21 [ 888.807614][T29110] chnl_net:caif_netlink_parms(): no params data found [ 888.876990][T29110] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.884318][T29110] bridge0: port 1(bridge_slave_0) entered disabled state [ 888.893579][T29110] device bridge_slave_0 entered promiscuous mode [ 888.905009][T29110] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.912333][T29110] bridge0: port 2(bridge_slave_1) entered disabled state [ 888.921614][T29110] device bridge_slave_1 entered promiscuous mode [ 888.961436][T29110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 888.976644][T29110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 889.019391][T29110] team0: Port device team_slave_0 added [ 889.030261][T29110] team0: Port device team_slave_1 added [ 889.096536][T29110] device hsr_slave_0 entered promiscuous mode [ 889.152864][T29110] device hsr_slave_1 entered promiscuous mode [ 889.192014][T29110] debugfs: Directory 'hsr0' with parent '/' already present! [ 889.219858][T29110] bridge0: port 2(bridge_slave_1) entered blocking state [ 889.227637][T29110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 889.235678][T29110] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.243062][T29110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 889.331413][T29110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 889.351621][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 889.364244][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.373856][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.394915][T29110] 8021q: adding VLAN 0 to HW filter on device team0 [ 889.408652][ T3890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 889.418774][ T3890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 889.428335][ T3890] bridge0: port 1(bridge_slave_0) entered blocking state [ 889.435688][ T3890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 889.524935][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 889.534381][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 889.544638][T28936] bridge0: port 2(bridge_slave_1) entered blocking state [ 889.551961][T28936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 889.560147][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 889.577255][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 889.633398][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 889.644022][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 889.654240][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 889.664819][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 889.677022][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 889.691428][T12409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 889.701920][T12409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 889.752428][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 889.762951][T28936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 889.778196][T29110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 889.816641][T29110] 8021q: adding VLAN 0 to HW filter on device batadv0 02:59:59 executing program 0: close(0xffffffffffffffff) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000100)) 02:59:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x4, 0x8}) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(r1, 0x402, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x9, 0x3, 0x0, 0x8}) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:59 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) 02:59:59 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 890.002704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 890.009360][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 890.122558][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 890.129036][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 890.136138][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 890.142423][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 890.262897][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 890.269423][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 890.502705][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 890.509321][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:59:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x4}) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7115}, 0x100) 02:59:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(r1, 0x402, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x9, 0x3, 0x0, 0x8}) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 02:59:59 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 02:59:59 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:00 executing program 5: 03:00:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, 0xffffffffffffffff, 0x0) 03:00:00 executing program 0: 03:00:00 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:00 executing program 5: 03:00:00 executing program 0: 03:00:00 executing program 5: 03:00:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, 0xffffffffffffffff, 0x0) 03:00:01 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) socket$inet6(0xa, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:01 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(r1, 0x402, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x9, 0x3, 0x0, 0x8}) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) [ 892.299066][T12651] device bridge_slave_1 left promiscuous mode [ 892.305937][T12651] bridge0: port 2(bridge_slave_1) entered disabled state [ 892.386196][T12651] device bridge_slave_0 left promiscuous mode [ 892.393025][T12651] bridge0: port 1(bridge_slave_0) entered disabled state 03:00:01 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:01 executing program 0: 03:00:01 executing program 5: 03:00:01 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:01 executing program 5: 03:00:01 executing program 0: 03:00:01 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:02 executing program 5: 03:00:02 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 894.193748][T12651] device hsr_slave_0 left promiscuous mode [ 894.232146][T12651] device hsr_slave_1 left promiscuous mode [ 894.295093][T12651] team0 (unregistering): Port device team_slave_1 removed [ 894.309128][T12651] team0 (unregistering): Port device team_slave_0 removed [ 894.324077][T12651] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 894.387923][T12651] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 894.477198][T12651] bond0 (unregistering): Released all slaves 03:00:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, 0xffffffffffffffff, 0x0) 03:00:03 executing program 0: 03:00:03 executing program 5: 03:00:03 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) fcntl$notify(r1, 0x402, 0x2) sendto$inet(r0, 0x0, 0x27a, 0x200007fd, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x9, 0x3, 0x0, 0x8}) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 03:00:03 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:03 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:03 executing program 5: 03:00:03 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:03 executing program 0: 03:00:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:04 executing program 5: 03:00:04 executing program 5: 03:00:04 executing program 0: 03:00:04 executing program 4: 03:00:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:04 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:04 executing program 5: 03:00:05 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:05 executing program 0: 03:00:05 executing program 5: 03:00:05 executing program 4: 03:00:05 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:05 executing program 4: 03:00:05 executing program 0: 03:00:05 executing program 5: syz_genetlink_get_family_id$team(0x0) 03:00:05 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(0xffffffffffffffff, r0, 0x0) 03:00:05 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:05 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:05 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, 0x0, 0x0) 03:00:05 executing program 0: 03:00:05 executing program 5: 03:00:05 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:05 executing program 0: 03:00:06 executing program 4: 03:00:06 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(0xffffffffffffffff, r0, 0x0) 03:00:06 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:06 executing program 5: 03:00:06 executing program 4: 03:00:06 executing program 0: 03:00:06 executing program 1: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:06 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(0xffffffffffffffff, r0, 0x0) 03:00:06 executing program 5: 03:00:06 executing program 0: 03:00:06 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:06 executing program 4: 03:00:06 executing program 4: 03:00:06 executing program 0: 03:00:06 executing program 5: 03:00:06 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:07 executing program 4: 03:00:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:07 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:07 executing program 0: 03:00:07 executing program 5: 03:00:07 executing program 0: 03:00:07 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:07 executing program 4: 03:00:07 executing program 0: 03:00:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:07 executing program 5: [ 898.432578][ C0] net_ratelimit: 8 callbacks suppressed [ 898.432603][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 898.444812][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:00:07 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:07 executing program 4: 03:00:07 executing program 1: socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:07 executing program 0: 03:00:07 executing program 5: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 03:00:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) [ 898.822718][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:00:08 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x5423, 0x0) 03:00:08 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:08 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:08 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) ioprio_set$pid(0x3, r0, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sched_setaffinity(0x0, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r2, r3, &(0x7f0000000180), 0xfffc) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r5 = dup2(r2, r2) ioctl$EVIOCGABS2F(r5, 0x8018456f, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000300)="2d8087e5a61bc2e4e11ce313109ce2b7919e668313", 0x15) bind$inet6(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 03:00:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:08 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x54a1, 0x0) 03:00:08 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:08 executing program 4: socket$netlink(0x10, 0x3, 0x0) pipe(0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write(0xffffffffffffffff, &(0x7f00000007c0)="4966fb20a7daebb9fff75b096cd4575d981fa092cc6c6aaad6ec56679c31fc2708902f6b115a5fa1242feca143b37f5bf8a33134298263ef39fa8d88a79a9e3822f0bea94ced841139cf00ea5db499a3d610a21faaafe2b87b90c60274e7783056d243f1ea445918f0d5", 0x6a) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a80)='TIPCv2\x00') ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x80) ptrace$getenv(0x4201, 0x0, 0x8000, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000040)={0x8, 0x0, &(0x7f0000000480)=[@decrefs={0x40046307, 0x1}], 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x6, 0x0) 03:00:08 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x0, &(0x7f00000002c0)=""/23, &(0x7f0000000300)=0x17) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:00:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:08 executing program 5: close(0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x800) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001240)=[{0x0}], 0x1}, 0x6}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x2, 0x0, 0x0) pipe2(0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18, 0xd, 0x0, {{0x1}}}, 0x18) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') write$P9_RRENAME(r0, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') pipe2$9p(0x0, 0x0) 03:00:08 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:09 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:09 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x20a, 0x200000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r2, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000080)="fc26dae658") 03:00:09 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:09 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00b\x18\xcd\xaaA\xaf\xf1W\xde\x91Y\xb2\x03\xf2,\xdf\x97\xf1\x99\xe0\x9a@$\xd9ll\t8\x94\x884|\xb4\xf2\xbc\xea\v|q:\xb4\xb7\x19\x15\xfd\xca\xd6\xb8: =D\xdd\xc8Y\xd2\xfb\xc9\xb3\x9d\xc1l\xcd0\b\xd4\x03\xd0iR\xb4\xf44\"I\xadU\x1fA\x14\xf6\xa07\x05\x82\xbd\x1a\xe3\xcc\xc6iX\xe9\x84\x04\\\xfbQ2\b\x8e\bX\x18\xafb\xbe\xf8\x1bH\xd3\xa5~\xe9k8\x85\xc7W\x9b2\xe7\xc4\xc7\x84?\xc4Q>\x00\x00\x00\x00\x00\x00\x00\x00\x006\x86!fe\xf3^}\x8b \x89\x1c4\xdev\xb8\xc5\x04\x9c\x1a\xa7\xa7\x15SV\xbd\xe2\n\x97\x85]\xb4\x8ec\xf3s0\xd6\x0f\xc5L\x947\xad7x\xe3\xc0~\xf8k\xab\xcf%<\x93\x11\xd7\xd1\x1c\xf3}]\x83\xec$\xcf\xdd\xd4\x95ta;\xb8\xe3\xc6\xfc\a<|\x97d\xc2c\xb3\xa4\x0f\b\' \x11\x8b\xcc\xd6&h\xb3Y\xbc\xf96\x97w\x16\x19D6+\x18#\xb3\x06PR\xc4k\x8f\x1c\xdd\x9d\xd1\x19J\xfa\x11\xa1\x16\xbfn28y\xb5\a\x8d\xbd\x96\xe76U\f\xaf\xe6\xccNQj\xfbD\xe7\x1aW7\xde\x04\xc2C\n\x91\x03') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:00:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:09 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:00:09 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000100), 0x20a, 0x200000000000000) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000440)) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) 03:00:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:10 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:10 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a648"], 0x0, 0x19}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:00:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 03:00:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:10 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) [ 901.203628][T29482] ptrace attach of "/root/syz-executor.4"[29481] was attempted by "/root/syz-executor.4"[29482] [ 901.333979][T29491] IPVS: ftp: loaded support on port[0] = 21 03:00:10 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 03:00:10 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x28}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/56}, {&(0x7f00000000c0)=""/26}], 0x262, 0x0) [ 901.582815][T29494] IPVS: ftp: loaded support on port[0] = 21 [ 901.622361][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:00:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:10 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00b\x18\xcd\xaaA\xaf\xf1W\xde\x91Y\xb2\x03\xf2,\xdf\x97\xf1\x99\xe0\x9a@$\xd9ll\t8\x94\x884|\xb4\xf2\xbc\xea\v|q:\xb4\xb7\x19\x15\xfd\xca\xd6\xb8: =D\xdd\xc8Y\xd2\xfb\xc9\xb3\x9d\xc1l\xcd0\b\xd4\x03\xd0iR\xb4\xf44\"I\xadU\x1fA\x14\xf6\xa07\x05\x82\xbd\x1a\xe3\xcc\xc6iX\xe9\x84\x04\\\xfbQ2\b\x8e\bX\x18\xafb\xbe\xf8\x1bH\xd3\xa5~\xe9k8\x85\xc7W\x9b2\xe7\xc4\xc7\x84?\xc4Q>\x00\x00\x00\x00\x00\x00\x00\x00\x006\x86!fe\xf3^}\x8b \x89\x1c4\xdev\xb8\xc5\x04\x9c\x1a\xa7\xa7\x15SV\xbd\xe2\n\x97\x85]\xb4\x8ec\xf3s0\xd6\x0f\xc5L\x947\xad7x\xe3\xc0~\xf8k\xab\xcf%<\x93\x11\xd7\xd1\x1c\xf3}]\x83\xec$\xcf\xdd\xd4\x95ta;\xb8\xe3\xc6\xfc\a<|\x97d\xc2c\xb3\xa4\x0f\b\' \x11\x8b\xcc\xd6&h\xb3Y\xbc\xf96\x97w\x16\x19D6+\x18#\xb3\x06PR\xc4k\x8f\x1c\xdd\x9d\xd1\x19J\xfa\x11\xa1\x16\xbfn28y\xb5\a\x8d\xbd\x96\xe76U\f\xaf\xe6\xccNQj\xfbD\xe7\x1aW7\xde\x04\xc2C\n\x91\x03') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) 03:00:10 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x28}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:10 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101e4f8d1b12b", @ANYRESHEX], 0x0, 0xe5}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:00:11 executing program 4: r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() write$P9_RWALK(0xffffffffffffffff, 0x0, 0xd386a0e741657035) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write(r0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'ip6_vti0\x00', 0x3ff}) read$char_usb(r0, 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000300)="152e091543888a55a5f4a77413dcab487a899d08c35f1321d1328a94e922ceb86aab867be2d35e0f75f6013d6446bb79a6b7473611401dab45159dd5434994fd8f01d67588b62a62852dd28418262606cc1320b5f17c52b4790bd1811fb45d7c93d6ad465ba1778eb3153b11019e5ed60929f090143bc152a14138e33526ffe7b0a23aed6c7c4a26841c62cdf668fe0264076094b15d5ee97618a07fd8beeaf31aa12468e2ccd5b31820b3bb4b4a5a0c8c9f88021551f2498eaead70") prlimit64(0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1) fsetxattr$security_evm(r0, &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@ng={0x4, 0x14, "9a2170c497f16d96af20"}, 0xc, 0x1) tkill(r1, 0x1000000000016) 03:00:11 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x3) [ 902.139988][T29531] ptrace attach of "/root/syz-executor.0"[29530] was attempted by "/root/syz-executor.0"[29531] 03:00:11 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 03:00:11 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:11 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x28}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) 03:00:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xc, 0x4, 0x400, 0x0, 0x1}, 0x3c) 03:00:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 902.582802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 902.589416][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:00:11 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x36}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 03:00:11 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:11 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0], 0x14}, 0x0) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/239, 0xef}], 0x1}}], 0x1, 0x0, 0x0) 03:00:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:12 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'ifb:\x00\x00\x00\x00\x00\x00\xee\xff\xff\xff\x00', 0x420000015001}) 03:00:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 902.982647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 902.989262][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:00:12 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:12 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:12 executing program 0: memfd_create(&(0x7f0000000000)='dev ', 0x0) syz_open_procfs(0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x16, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:00:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:12 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 903.646533][T29594] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:00:12 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000002, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r1, 0x5406, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x100000009b4b62b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x81) 03:00:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) [ 903.878476][T29594] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:00:13 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x20000004e20, @multicast1}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr2', 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="dc", 0xfffffffffffffe8a, 0x1f4, 0x0, 0x41a2) read(r0, &(0x7f00000000c0)=""/18, 0x12) 03:00:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x4000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) rt_sigqueueinfo(r0, 0xfffffffffffffff, &(0x7f0000000100)) 03:00:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:13 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) [ 904.401998][T29632] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:00:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="d6f8ffffffffffff0000000000000000e309"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0xfffffffffffffffd) r1 = memfd_create(&(0x7f00000001c0)='G\'\x00\x9c\x1cH\xf9\x9e\x00\x16~\xdb`\x89\x86\x9a\xd4\xceof-\xbc\x12\x94\xe7\xcbH\x8dU;Z\xfc\xe1id?\xd4\x8a\x00Y@\xfe\xfe\b\x8d\xd0\x84\xcd\xf5\xd5\x83\xec\x96;\x16\x17\xf2\xba\xe1=\xe6.\xa5|\x02q', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x1, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0xfffffffffffffe00}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000280)='net/netstat\x00') 03:00:13 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) [ 904.766109][T29647] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r0, 0x0, 0x0) [ 904.822853][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 904.829541][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:00:14 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000400)='smaps\x00') sendfile(r0, r3, 0x0, 0x80000000) 03:00:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, r1, 0x0) 03:00:14 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') [ 905.306173][T29669] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:14 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:14 executing program 4: prctl$PR_SET_ENDIAN(0x14, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x5e0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) ioctl$SIOCGSTAMP(r3, 0x8906, 0x0) 03:00:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) dup3(r0, r1, 0x0) 03:00:14 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') 03:00:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)) [ 905.782567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 905.789132][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 905.796059][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 905.802676][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:00:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpgrp(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000400)='smaps\x00') sendfile(r0, r3, 0x0, 0x80000000) 03:00:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) dup3(r0, r1, 0x0) 03:00:15 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) [ 906.004620][T29701] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:15 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="d3d2b53c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c825255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab56", @ANYRESHEX, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca02f937d049248261244e2e0c734057548c402cc43b3897cc275fd87f333c960dfc2ba9dd3873fc8dc4872bf5b65c87e940b30eecd4f9ad4c079521dfdaf3d0fef515586de3c101", @ANYRESHEX], 0x0, 0xd8}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 906.237051][T29715] ptrace attach of "/root/syz-executor.4"[29714] was attempted by "/root/syz-executor.4"[29715] 03:00:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) 03:00:15 executing program 4: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0xfffffffffffffff9}) [ 906.467491][T29722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:15 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) dup3(r0, r1, 0x0) 03:00:15 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) 03:00:15 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x208204) r2 = open(&(0x7f0000000140)='./bus\x00', 0x14102e, 0x20) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r2, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000003700)={0x0, 0x40000000000006, 0x80000000000001}) 03:00:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) 03:00:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="6d616e675e6500000000000000000031232ed6526bb5957004b38e00000000fb00000000000040e2ff6900000000edff001ca005000058024f9f82a3306e074fd9ab0d8dd0d93cb0c35f962e214f71d9be9aaf2b6c"], 0x1) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 906.742704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 906.749203][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:00:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00'}) dup3(r0, r1, 0x0) 03:00:16 executing program 5: prctl$PR_SET_ENDIAN(0x14, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x5e0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) ioctl$SIOCGSTAMP(r3, 0x8906, 0x0) [ 906.899169][T29742] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 906.913013][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 906.919650][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:00:16 executing program 4: prctl$PR_SET_ENDIAN(0x14, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) ioprio_get$uid(0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='\'@-@vmnet1md5sum\x00') ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x5e0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000200)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4000}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(r3, 0x8906, 0x0) 03:00:16 executing program 1: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) 03:00:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) 03:00:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00'}) dup3(r0, r1, 0x0) [ 907.546637][T29773] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:16 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:16 executing program 5: ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) 03:00:16 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 03:00:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00'}) dup3(r0, r1, 0x0) 03:00:16 executing program 1: semget$private(0x0, 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x2d1, 0x400000) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000600)=""/137, 0x89}, {&(0x7f00000006c0)=""/212, 0xd4}], 0x3, &(0x7f0000000cc0)=[{0x0}, {&(0x7f00000007c0)=""/245, 0xf5}, {&(0x7f0000000100)=""/16, 0x10}, {&(0x7f0000000340)=""/2, 0x2}, {&(0x7f0000000980)=""/94, 0x5e}, {&(0x7f0000000a00)=""/172, 0xac}, {&(0x7f0000000ac0)=""/208, 0xd0}, {&(0x7f0000000bc0)=""/229, 0xe5}], 0x8, 0x0) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f0000000140)=0x1000, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x0, 0x0, 0x1}, 0x1c) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000440)=""/175, 0xaf) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:00:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000b80)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000100)) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pselect6(0x40, &(0x7f0000000f40), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 907.851675][T29789] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(0xffffffffffffffff, r1, 0x0) 03:00:17 executing program 5: 03:00:17 executing program 1: 03:00:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:17 executing program 5: 03:00:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(0xffffffffffffffff, r1, 0x0) 03:00:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:17 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000000780)=[{&(0x7f0000000380)=""/167, 0xa7}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/127, 0x7f}, {0x0}], 0x2) 03:00:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000b80)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000100)) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:00:17 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) [ 908.719397][T29816] __nla_validate_parse: 1 callbacks suppressed [ 908.719427][T29816] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x2d1, 0x400000) 03:00:18 executing program 4: 03:00:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(0xffffffffffffffff, r1, 0x0) 03:00:18 executing program 5: 03:00:18 executing program 5: [ 909.289841][T29844] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:18 executing program 5: 03:00:18 executing program 4: 03:00:18 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, 0xffffffffffffffff, 0x0) 03:00:18 executing program 1: 03:00:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:18 executing program 4: 03:00:18 executing program 5: [ 909.791501][T29862] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:18 executing program 4: 03:00:19 executing program 5: 03:00:19 executing program 1: 03:00:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, 0xffffffffffffffff, 0x0) 03:00:19 executing program 4: [ 910.289413][T29879] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:19 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:19 executing program 5: 03:00:19 executing program 1: 03:00:19 executing program 4: 03:00:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000011c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1b}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9=\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) dup3(r0, 0xffffffffffffffff, 0x0) 03:00:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:19 executing program 1: 03:00:19 executing program 4: [ 910.744249][T29897] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:19 executing program 5: 03:00:20 executing program 1: 03:00:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:20 executing program 5: [ 911.331282][T29915] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:20 executing program 1: 03:00:20 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:20 executing program 4: 03:00:20 executing program 5: 03:00:20 executing program 2: 03:00:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:20 executing program 5: [ 911.673804][T29921] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:20 executing program 4: 03:00:20 executing program 2: 03:00:20 executing program 1: 03:00:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r6, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000080)) fcntl$getownex(r3, 0x10, &(0x7f0000000500)) pread64(r7, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:21 executing program 2: 03:00:21 executing program 1: [ 912.137492][T29942] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:21 executing program 4: 03:00:21 executing program 5: 03:00:21 executing program 2: 03:00:21 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:21 executing program 1: 03:00:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r6, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000080)) fcntl$getownex(r3, 0x10, &(0x7f0000000500)) pread64(r7, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:21 executing program 4: 03:00:21 executing program 1: 03:00:21 executing program 2: 03:00:21 executing program 5: [ 912.667466][T29954] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:21 executing program 1: 03:00:22 executing program 5: 03:00:22 executing program 4: 03:00:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r5 = socket$inet(0x10, 0x3, 0xc) sendmsg(r5, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000300)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r6, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000080)) fcntl$getownex(r3, 0x10, &(0x7f0000000500)) pread64(r7, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 913.171675][T29975] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:22 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:22 executing program 2: 03:00:22 executing program 5: 03:00:22 executing program 1: 03:00:22 executing program 4: 03:00:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:22 executing program 5: 03:00:22 executing program 2: 03:00:22 executing program 1: 03:00:22 executing program 4: 03:00:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:22 executing program 1: [ 913.886210][T30002] __nla_validate_parse: 1 callbacks suppressed [ 913.886236][T30002] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:23 executing program 4: 03:00:23 executing program 2: 03:00:23 executing program 5: 03:00:23 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:23 executing program 1: 03:00:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:23 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000017000)=0x6, 0x4) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x4e20, @local}, 0x10) bind$inet(r0, &(0x7f0000000040)={0x2, 0x200000004e20, @local}, 0x10) 03:00:23 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x472, 0x10000) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000440)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) [ 914.480957][T30015] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xc, 0x4, 0x400, 0x0, 0x1}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 03:00:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') sendfile(r0, r1, 0x0, 0xfffc) 03:00:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:23 executing program 1: 03:00:23 executing program 4: 03:00:23 executing program 2: [ 914.962120][T30041] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:24 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) 03:00:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000008c0)=@md0='/dev/md0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f00000004c0)='nfsd\x00', 0x2000023, &(0x7f00000006c0)='\x8auU{-\x154\x05-\xab\xc0\xcb\x1an\xd76*5\xec2c\x9f\xcf\xb8\xb6v\x9aA\x06K\x95\xd4dx#\xf8\x90\r\xf1S\xc4\xc2\a\b\x03^\xe6b\x03\xaal)eb,z4\xc9\xe8\x11Y\xacV') 03:00:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="38f37fdba0"], 0x0, 0x5}, 0x20) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000100)={0x0, @dev, 0x4e21, 0x0, 'wlc\x00'}, 0x2c) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:00:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 03:00:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 915.453984][T30062] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 03:00:24 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stat\x00') preadv(r0, &(0x7f0000000100), 0x33e, 0x0) 03:00:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_TSC_KHZ(r2, 0xaea3) 03:00:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) [ 915.829286][T30080] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:25 executing program 1: rmdir(0x0) r0 = socket$inet6(0xa, 0x3, 0x80000000000006) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, &(0x7f00000000c0)=0x202, 0x8) 03:00:25 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:25 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x1, @sliced}) 03:00:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000180)={r0, &(0x7f00000003c0), 0x0}, 0x18) 03:00:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000000)={0x3, "6e36be"}, 0x4) 03:00:25 executing program 5: mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2$9p(&(0x7f0000000080), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:00:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe2$9p(&(0x7f0000000080), 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:00:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200), 0x8) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 916.478414][T30101] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:25 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=0x5, 0x12) 03:00:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:25 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x80000000000006) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) 03:00:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x80000000000006) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, &(0x7f00000000c0), 0x8) [ 916.809429][T30129] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:26 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:26 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)=ANY=[@ANYBLOB="005f83e38c308120f4112ff6b6f8579c2946"], 0x4) 03:00:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x3, 0x0, &(0x7f0000000040)) 03:00:26 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) 03:00:26 executing program 4: mkdir(0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) r0 = socket$inet6(0xa, 0x3, 0x80000000000006) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, &(0x7f00000000c0)=0x202, 0x8) [ 917.336075][T30145] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000380)) 03:00:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:26 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000000)={0x3, "0336be"}, 0x4) 03:00:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0028000]}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) 03:00:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xc, 0x4, 0x400, 0x0, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 917.832006][T30172] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:27 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x24, 0x0, &(0x7f0000000040)) 03:00:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca5055e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x800000000b, 0x0, &(0x7f0000000040)) 03:00:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:27 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$setown(r0, 0x8, r1) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000001, 0x18000) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000000040)={0x5, 0x2, 0x1, 0xfffffffffffff797}, 0x10) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x80000) [ 918.305040][T30192] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x9b\x00\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) 03:00:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\xfc\xff\xff\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) 03:00:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xc, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 03:00:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:28 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:28 executing program 1: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x22, 0x0, &(0x7f0000000040)) 03:00:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(0xffffffffffffffff, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 919.213677][T30226] __nla_validate_parse: 1 callbacks suppressed [ 919.213704][T30226] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:00:28 executing program 1: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000040)) [ 919.435408][T30209] device sit0 entered promiscuous mode 03:00:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(0xffffffffffffffff, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 919.644219][T30250] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 919.972314][T30212] device sit0 entered promiscuous mode [ 920.183207][T30229] device sit0 left promiscuous mode [ 920.228831][T30232] device sit0 entered promiscuous mode [ 920.253332][T30237] device sit0 left promiscuous mode 03:00:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000500)={'sit0\x00\x00\x00\x00\x00\x00\x00\xd6\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x9b\x00\xff\xff\xa0\x00Q\xfc\x03\x00', 0x141}) [ 920.422470][T30238] device sit0 entered promiscuous mode 03:00:29 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) close(r0) 03:00:29 executing program 1: getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(0xffffffffffffffff, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:29 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:29 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRESHEX, @ANYBLOB="e6c55c669eb82eec510100019b3d7280437a746201000600090001000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f339cccbe4f452a030a3c960d2bc40dd80b732711552f5f19b3d4b9b85c147e403814975a57a8e12695ad42c8cc9bf3d9916211f6386a5078a215ffbb72"], 0x0, 0xa8}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:00:29 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r3, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) dup2(r1, r0) [ 920.726066][T30266] ptrace attach of "/root/syz-executor.4"[30265] was attempted by "/root/syz-executor.4"[30266] [ 920.755794][T30262] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000040)) [ 920.855577][T30255] device sit0 left promiscuous mode 03:00:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sched_setaffinity(0x0, 0x1, &(0x7f0000000540)=0x5) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r1, r2, 0x0, 0xfffc) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 03:00:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r3, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) dup2(r1, r0) [ 921.245074][T30287] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 921.707557][T30257] device sit0 entered promiscuous mode 03:00:30 executing program 2: syz_genetlink_get_family_id$tipc2(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stat\x00') preadv(r0, &(0x7f0000000100), 0x33e, 0x0) 03:00:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sched_setaffinity(0x0, 0x1, &(0x7f0000000540)=0x5) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountinfo\x00') sendfile(r1, r2, 0x0, 0xfffc) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 03:00:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:30 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)) read(r0, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000000040)) 03:00:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r3, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) dup2(r1, r0) [ 921.895812][T30308] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000040)) 03:00:31 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d3d2b97938f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="e6c55c669eb82eec510100019b"], 0x0, 0xd}, 0x20) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:00:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r2 = dup2(r0, r0) r3 = dup2(r0, r2) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r3, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) dup2(r1, r0) 03:00:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 922.234968][T30323] ptrace attach of "/root/syz-executor.5"[30322] was attempted by "/root/syz-executor.5"[30323] 03:00:31 executing program 5: r0 = open(&(0x7f0000000140)='.\x00', 0x143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 03:00:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f00000002c0)={0x57}) 03:00:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000040)) [ 922.426224][T30331] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:31 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000040)) 03:00:31 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = socket$packet(0x11, 0x200000000000002, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'veth0\x00', 0x201a}) openat$zero(0xffffffffffffff9c, 0x0, 0x20880, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) dup2(r0, r1) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) 03:00:31 executing program 2: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x7, r0, 0x0, 0x0) 03:00:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) [ 922.979886][T30352] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000140)=ANY=[@ANYPTR64], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f00000001c0)='?', 0x1, 0x1, 0x0, 0x0) close(r0) 03:00:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) 03:00:32 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:32 executing program 5: r0 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lstat(0x0, 0x0) 03:00:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) 03:00:32 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) [ 923.537174][T30384] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 923.552765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 923.559319][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 923.782882][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 923.789472][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:00:32 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:32 executing program 2: poll(0x0, 0x0, 0x4b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) recvfrom$inet6(r2, &(0x7f0000000000)=""/103, 0x67, 0xc0, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) 03:00:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, 0x0) 03:00:32 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000080)=""/22, 0x16}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r0, 0x0) setsockopt$inet_int(r0, 0x0, 0x43, &(0x7f0000000000), 0x4) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r1, 0x0) 03:00:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000380)={0x0, 0x199, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/157, 0x9d}], 0x100000000000000f, 0x0, 0xffffffffffffffee}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xff8c, 0x0, 0x0, 0x800e00639) dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfd1d, 0x0, 0x0, 0x800e0063d) shutdown(r1, 0x0) recvmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) shutdown(r3, 0x0) shutdown(r2, 0x0) 03:00:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, r0) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 924.841170][T30435] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/214, 0xd6}], 0x100000000000036c}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x245, 0x0, 0x0, 0x800e00512) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)=""/105, 0x69}, {0x0}, {0x0}], 0x3}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000001b40)=[{&(0x7f0000000280)=""/250, 0xfa}, {0x0}], 0x2) shutdown(r4, 0x0) shutdown(r1, 0x0) 03:00:34 executing program 1: poll(0x0, 0x0, 0x4b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00509) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) preadv(r1, &(0x7f0000002300)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5, 0x0) recvfrom$inet(r1, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) 03:00:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r1, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) r3 = dup(r2) setsockopt$sock_timeval(r3, 0xffff, 0x1006, &(0x7f0000000000)={0x4}, 0x10) shutdown(0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x9, 0x0, 0x0) recvfrom$inet(r1, 0x0, 0x1f044b84, 0x40002, 0x0, 0x800e00521) shutdown(r1, 0x0) 03:00:34 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/19, 0x79e2494) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r7, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r1, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) [ 925.184086][T30449] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:34 executing program 2: 03:00:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r7, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:34 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r1, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:34 executing program 1: 03:00:34 executing program 2: 03:00:34 executing program 5: [ 925.651668][T30470] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:34 executing program 1: 03:00:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="000fb8e97ead0ce8c8a30000f7d01eea7999068ae2bf4bad19af8e6702ae60d93b64bf9e2522426f1a34b6300ee5c0eb2cc10e739652339e8af7885d7eda6d68a594c39ef2ed89991430f6149dc0eb2d48e7dfbb1c7b393dc9d50199fe0800000000000000f82dc02ab6040300000000000e8827d75a87671185940d315e1f81e04df7235ec7a76d816f68bf51e996bd36e1270d4c643b46185ae0c1f15f1ef01ebce924cedb1c330e43571f561e312783148a2d2ded573fa1ac52bbd04f1d387ccd47ae9c4025b3482fc8c748a81c582aede5209098b8ab7399fdc01a84b9d2df2c21079dc660e0f30211393b9ba57c815af23c39c8f352d49b6d4fe5be5a48cad09d6b8166849bbeb51ecf861ae19c9722931ae3fd806b8c2cfac6b14259e2b852584354135704f1f472692329024be00523a1098c30762dfd53fea2d12a9f3c50f1a01ff57d6e5f0150e5b87d1149fabc22dc070000007a298e0000000000dd000000000000000000000000000000006c3fa5147ff19fe0926685fce60a3d686c2e427a59883023ad5ca0b07800c923d4c5bb7dfc0cf3a70fa4b9f5dc84d9afdbde5fc543b8fbebc60e6476649c291a673d48c9275ea2395a912d10d2c69688acce59cba87524d8c034656604dcca7d385ec589b2e6bf89626ba8be7e49925b1b3299d4d1c42a5a984bbdfb7c92515ab7a2c8c708b83e1bd0e73e12adac1df04e0000000000000000000000003d650f73f05fc894249efd42d10e9d43077c799e2945a31a7da423c5d7cc02660aba3026a5a942d8fa0c6bdb91c367f66785d91daf2dea4f412362217c0416c50c5a6f06d4bee591a3d4e42daecaf72a5e50fb59a454cb411c40cd85e997ca986bed8df0427de14de4f482f427bd946f16d2cb1c0908455ec4c35b99d1e059fd426a11a5c941fb2b686d444ecbbdbf782f4283c4e454bdb53645b3d804df1a87ddb58c6d8149f1a1397d929294b3d2fd53fe9182b8e4f7abbc4ce3458ee50083b825ff46bbe89121f8822cf1686377b00d8533cae22716dbbdc57e19ac734bcd5ee07804042fe7b9f60000000000000000000000000000000000000000000000000000000000000000cc7ecbd2c96889e6f5f192b5f17771c666f29316c4728e54807f3fa56d77b74b160782a5012eb4440000009c82567db57e8f99bbbe1e2a17c75766edd5715c00ebdfa35fa7c38ec566467faf0f837a460caafec27b324a9f12b89e36a59ae40600"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) setpriority(0x1, 0x0, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r7, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) 03:00:34 executing program 5: r0 = syz_usb_connect(0x0, 0x1e7, &(0x7f0000001780)={{0x12, 0x1, 0x0, 0x51, 0xdf, 0x3, 0x8, 0xc72, 0x14, 0x8b53, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x92, 0x0, 0x0, 0xf3, 0xd, 0xa6}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000380)={0x2c, &(0x7f00000001c0)={0x0, 0x0, 0xa, "b814130afafb28bd488b"}, 0x0, 0x0, 0x0, 0x0}) 03:00:35 executing program 3: sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001480)=ANY=[@ANYBLOB="0d05c1ff0f00002201000a"], 0x1}}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xae9d808f) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7ff}) read(r0, 0x0, 0x0) read(r1, &(0x7f0000002780)=""/4096, 0x112c) 03:00:35 executing program 2: 03:00:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:35 executing program 1: [ 926.107934][T30488] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 03:00:35 executing program 2: 03:00:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:35 executing program 1: 03:00:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x412, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"/897], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x4000000, &(0x7f0000000700)="02dc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3a8e9439f3d7eecb7a3fb3097d75f88aa") r6 = socket$inet(0x10, 0x3, 0xc) sendmsg(r6, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000300)) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r7, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r6, 0x894b, &(0x7f00000003c0)) ioctl$EVIOCGPROP(r8, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r3, &(0x7f00000002c0)={0x2}) fcntl$getownex(r4, 0x10, &(0x7f0000000500)) pread64(r8, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 926.362505][ T5] usb 6-1: new high-speed USB device number 2 using dummy_hcd 03:00:35 executing program 2: 03:00:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffffa, 0x20000802, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = dup2(r0, r0) r2 = dup2(r0, r1) sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000180)=ANY=[@ANYRES32], 0x1}}, 0x0) sendmmsg$inet(r2, &(0x7f000000fd80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000280)="f8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f00000018c0)="12", 0x1}], 0x1}}], 0x2, 0x90) 03:00:35 executing program 1: [ 926.617468][T30510] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 926.633047][ T5] usb 6-1: Using ep0 maxpacket: 8 [ 926.765741][ T5] usb 6-1: config 0 has an invalid interface number: 146 but max is 0 [ 926.774270][ T5] usb 6-1: config 0 has no interface number 0 [ 926.780590][ T5] usb 6-1: New USB device found, idVendor=0c72, idProduct=0014, bcdDevice=8b.53 [ 926.790223][ T5] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 926.920154][ T5] usb 6-1: config 0 descriptor?? [ 927.192325][ T5] peak_usb 6-1:0.146: PEAK-System PCAN-USB X6 v72 fw v139.0.0 (2 channels) [ 927.202454][ T5] ================================================================== [ 927.210618][ T5] BUG: KMSAN: kernel-usb-infoleak in usb_submit_urb+0x7ef/0x1f50 [ 927.218375][ T5] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.3.0-rc3+ #17 [ 927.225769][ T5] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.235876][ T5] Workqueue: usb_hub_wq hub_event [ 927.240946][ T5] Call Trace: [ 927.244316][ T5] dump_stack+0x191/0x1f0 [ 927.248720][ T5] kmsan_report+0x162/0x2d0 [ 927.253273][ T5] kmsan_internal_check_memory+0x7be/0x8d0 [ 927.259140][ T5] ? device_add+0x25b5/0x2df0 [ 927.263874][ T5] ? usb_new_device+0x23e5/0x2fb0 [ 927.268942][ T5] ? hub_event+0x581d/0x72f0 [ 927.274656][ T5] ? process_one_work+0x1572/0x1ef0 [ 927.279956][ T5] kmsan_handle_urb+0x28/0x40 [ 927.284707][ T5] usb_submit_urb+0x7ef/0x1f50 [ 927.289637][ T5] usb_start_wait_urb+0x143/0x410 [ 927.294736][ T5] usb_control_msg+0x49f/0x7f0 [ 927.299589][ T5] pcan_usb_pro_send_req+0x26b/0x3e0 [ 927.305067][ T5] pcan_usb_fd_init+0x16ee/0x1900 [ 927.310169][ T5] ? pcan_usb_pro_set_ts+0x490/0x490 [ 927.315504][ T5] peak_usb_probe+0x1416/0x1b20 [ 927.320406][ T5] ? peak_usb_do_device_exit+0x240/0x240 [ 927.326096][ T5] usb_probe_interface+0xd19/0x1310 [ 927.331366][ T5] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 927.337402][ T5] ? usb_register_driver+0x7d0/0x7d0 [ 927.342741][ T5] really_probe+0x1373/0x1dc0 [ 927.347477][ T5] driver_probe_device+0x1ba/0x510 [ 927.352672][ T5] __device_attach_driver+0x5b8/0x790 [ 927.358117][ T5] ? bus_for_each_drv+0x1d5/0x3b0 [ 927.363190][ T5] bus_for_each_drv+0x28e/0x3b0 [ 927.368094][ T5] ? deferred_probe_work_func+0x400/0x400 [ 927.373886][ T5] __device_attach+0x489/0x750 [ 927.378718][ T5] device_initial_probe+0x4a/0x60 [ 927.383789][ T5] bus_probe_device+0x131/0x390 [ 927.388713][ T5] device_add+0x25b5/0x2df0 [ 927.393313][ T5] ? usb_set_configuration+0x3036/0x3710 [ 927.399038][ T5] usb_set_configuration+0x309f/0x3710 [ 927.404708][ T5] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 927.410853][ T5] generic_probe+0xe7/0x280 [ 927.415404][ T5] ? usb_probe_device+0x104/0x200 [ 927.420488][ T5] ? usb_choose_configuration+0xae0/0xae0 [ 927.426262][ T5] usb_probe_device+0x146/0x200 [ 927.431165][ T5] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 927.437213][ T5] ? usb_register_device_driver+0x470/0x470 [ 927.443161][ T5] really_probe+0x1373/0x1dc0 [ 927.447905][ T5] driver_probe_device+0x1ba/0x510 [ 927.453069][ T5] __device_attach_driver+0x5b8/0x790 [ 927.458528][ T5] ? bus_for_each_drv+0x1d5/0x3b0 [ 927.463684][ T5] bus_for_each_drv+0x28e/0x3b0 [ 927.468589][ T5] ? deferred_probe_work_func+0x400/0x400 [ 927.474384][ T5] __device_attach+0x489/0x750 [ 927.479210][ T5] device_initial_probe+0x4a/0x60 [ 927.484469][ T5] bus_probe_device+0x131/0x390 [ 927.489371][ T5] device_add+0x25b5/0x2df0 [ 927.493944][ T5] usb_new_device+0x23e5/0x2fb0 [ 927.498875][ T5] hub_event+0x581d/0x72f0 [ 927.503424][ T5] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 927.509434][ T5] ? led_work+0x720/0x720 [ 927.513789][ T5] ? led_work+0x720/0x720 [ 927.518151][ T5] process_one_work+0x1572/0x1ef0 [ 927.523255][ T5] worker_thread+0x111b/0x2460 [ 927.528112][ T5] kthread+0x4b5/0x4f0 [ 927.532209][ T5] ? process_one_work+0x1ef0/0x1ef0 [ 927.537450][ T5] ? kthread_blkcg+0xf0/0xf0 [ 927.542095][ T5] ret_from_fork+0x35/0x40 [ 927.546559][ T5] [ 927.548900][ T5] Uninit was created at: [ 927.553181][ T5] kmsan_internal_poison_shadow+0x53/0xa0 [ 927.558931][ T5] kmsan_slab_alloc+0xaa/0x120 [ 927.563739][ T5] kmem_cache_alloc_trace+0x8c5/0xd20 [ 927.569134][ T5] pcan_usb_fd_init+0x446/0x1900 [ 927.574202][ T5] peak_usb_probe+0x1416/0x1b20 [ 927.579086][ T5] usb_probe_interface+0xd19/0x1310 [ 927.584317][ T5] really_probe+0x1373/0x1dc0 [ 927.589039][ T5] driver_probe_device+0x1ba/0x510 [ 927.594194][ T5] __device_attach_driver+0x5b8/0x790 [ 927.599599][ T5] bus_for_each_drv+0x28e/0x3b0 [ 927.604483][ T5] __device_attach+0x489/0x750 [ 927.609288][ T5] device_initial_probe+0x4a/0x60 [ 927.614466][ T5] bus_probe_device+0x131/0x390 [ 927.619343][ T5] device_add+0x25b5/0x2df0 [ 927.623878][ T5] usb_set_configuration+0x309f/0x3710 [ 927.629372][ T5] generic_probe+0xe7/0x280 [ 927.633902][ T5] usb_probe_device+0x146/0x200 [ 927.638786][ T5] really_probe+0x1373/0x1dc0 [ 927.643498][ T5] driver_probe_device+0x1ba/0x510 [ 927.648651][ T5] __device_attach_driver+0x5b8/0x790 [ 927.654062][ T5] bus_for_each_drv+0x28e/0x3b0 [ 927.659590][ T5] __device_attach+0x489/0x750 [ 927.664390][ T5] device_initial_probe+0x4a/0x60 [ 927.669453][ T5] bus_probe_device+0x131/0x390 [ 927.674332][ T5] device_add+0x25b5/0x2df0 [ 927.678874][ T5] usb_new_device+0x23e5/0x2fb0 [ 927.683762][ T5] hub_event+0x581d/0x72f0 [ 927.688228][ T5] process_one_work+0x1572/0x1ef0 [ 927.694231][ T5] worker_thread+0x111b/0x2460 [ 927.699025][ T5] kthread+0x4b5/0x4f0 [ 927.703306][ T5] ret_from_fork+0x35/0x40 [ 927.707731][ T5] [ 927.710072][ T5] Bytes 2-15 of 16 are uninitialized [ 927.715457][ T5] Memory access of size 16 starts at ffff888045b5e000 [ 927.722264][ T5] ================================================================== [ 927.730867][ T5] Disabling lock debugging due to kernel taint [ 927.737040][ T5] Kernel panic - not syncing: panic_on_warn set ... [ 927.743652][ T5] CPU: 0 PID: 5 Comm: kworker/0:0 Tainted: G B 5.3.0-rc3+ #17 [ 927.752594][ T5] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.762683][ T5] Workqueue: usb_hub_wq hub_event [ 927.767735][ T5] Call Trace: [ 927.771078][ T5] dump_stack+0x191/0x1f0 [ 927.775450][ T5] panic+0x3c9/0xc1e [ 927.779421][ T5] kmsan_report+0x2ca/0x2d0 [ 927.783980][ T5] kmsan_internal_check_memory+0x7be/0x8d0 [ 927.789826][ T5] ? device_add+0x25b5/0x2df0 [ 927.794522][ T5] ? usb_new_device+0x23e5/0x2fb0 [ 927.799560][ T5] ? hub_event+0x581d/0x72f0 [ 927.804177][ T5] ? process_one_work+0x1572/0x1ef0 [ 927.809541][ T5] kmsan_handle_urb+0x28/0x40 [ 927.814257][ T5] usb_submit_urb+0x7ef/0x1f50 [ 927.819123][ T5] usb_start_wait_urb+0x143/0x410 [ 927.824215][ T5] usb_control_msg+0x49f/0x7f0 [ 927.829057][ T5] pcan_usb_pro_send_req+0x26b/0x3e0 [ 927.834485][ T5] pcan_usb_fd_init+0x16ee/0x1900 [ 927.839626][ T5] ? pcan_usb_pro_set_ts+0x490/0x490 [ 927.844973][ T5] peak_usb_probe+0x1416/0x1b20 [ 927.849882][ T5] ? peak_usb_do_device_exit+0x240/0x240 [ 927.855549][ T5] usb_probe_interface+0xd19/0x1310 [ 927.860801][ T5] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 927.866824][ T5] ? usb_register_driver+0x7d0/0x7d0 [ 927.872420][ T5] really_probe+0x1373/0x1dc0 [ 927.877290][ T5] driver_probe_device+0x1ba/0x510 [ 927.882485][ T5] __device_attach_driver+0x5b8/0x790 [ 927.887898][ T5] ? bus_for_each_drv+0x1d5/0x3b0 [ 927.892973][ T5] bus_for_each_drv+0x28e/0x3b0 [ 927.898101][ T5] ? deferred_probe_work_func+0x400/0x400 [ 927.903892][ T5] __device_attach+0x489/0x750 [ 927.908717][ T5] device_initial_probe+0x4a/0x60 [ 927.913788][ T5] bus_probe_device+0x131/0x390 [ 927.918697][ T5] device_add+0x25b5/0x2df0 [ 927.923259][ T5] ? usb_set_configuration+0x3036/0x3710 [ 927.929115][ T5] usb_set_configuration+0x309f/0x3710 [ 927.934660][ T5] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 927.940798][ T5] generic_probe+0xe7/0x280 [ 927.945346][ T5] ? usb_probe_device+0x104/0x200 [ 927.950412][ T5] ? usb_choose_configuration+0xae0/0xae0 [ 927.956174][ T5] usb_probe_device+0x146/0x200 [ 927.961047][ T5] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 927.967105][ T5] ? usb_register_device_driver+0x470/0x470 [ 927.973045][ T5] really_probe+0x1373/0x1dc0 [ 927.977786][ T5] driver_probe_device+0x1ba/0x510 [ 927.982964][ T5] __device_attach_driver+0x5b8/0x790 [ 927.988413][ T5] ? bus_for_each_drv+0x1d5/0x3b0 [ 927.993477][ T5] bus_for_each_drv+0x28e/0x3b0 [ 927.998370][ T5] ? deferred_probe_work_func+0x400/0x400 [ 928.004153][ T5] __device_attach+0x489/0x750 [ 928.008983][ T5] device_initial_probe+0x4a/0x60 [ 928.014064][ T5] bus_probe_device+0x131/0x390 [ 928.018982][ T5] device_add+0x25b5/0x2df0 [ 928.023665][ T5] usb_new_device+0x23e5/0x2fb0 [ 928.028599][ T5] hub_event+0x581d/0x72f0 [ 928.033135][ T5] ? kmsan_get_shadow_origin_ptr+0x28c/0x3a0 [ 928.039169][ T5] ? led_work+0x720/0x720 [ 928.043548][ T5] ? led_work+0x720/0x720 [ 928.047934][ T5] process_one_work+0x1572/0x1ef0 [ 928.053192][ T5] worker_thread+0x111b/0x2460 [ 928.058911][ T5] kthread+0x4b5/0x4f0 [ 928.063021][ T5] ? process_one_work+0x1ef0/0x1ef0 [ 928.068358][ T5] ? kthread_blkcg+0xf0/0xf0 [ 928.072994][ T5] ret_from_fork+0x35/0x40 [ 928.078566][ T5] Kernel Offset: disabled [ 928.082929][ T5] Rebooting in 86400 seconds..