x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000200)) sendmsg$key(r5, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) syz_usb_connect(0x0, 0x3d, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r5, @ANYRESHEX=r5], 0x0) 13:39:23 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x3b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) [ 511.441212][T14767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 511.461014][T14770] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:23 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:39:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) 13:39:23 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x3c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:23 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) [ 511.642653][T14777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 511.703555][T14781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 511.764567][ T9819] usb 5-1: new high-speed USB device number 27 using dummy_hcd [ 511.954487][ T9819] usb 5-1: device descriptor read/64, error 18 [ 512.224482][ T9819] usb 5-1: new high-speed USB device number 28 using dummy_hcd [ 512.414941][ T9819] usb 5-1: device descriptor read/64, error 18 [ 512.535123][ T9819] usb usb5-port1: attempt power cycle 13:39:24 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:39:24 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x3d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) 13:39:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:24 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) [ 513.244276][ T9819] usb 5-1: new high-speed USB device number 29 using dummy_hcd [ 513.414733][ T9819] usb 5-1: device descriptor read/8, error -61 [ 513.684220][ T9819] usb 5-1: new high-speed USB device number 30 using dummy_hcd [ 513.854224][ T9819] usb 5-1: device descriptor read/8, error -61 [ 513.974747][ T9819] usb usb5-port1: unable to enumerate USB device 13:39:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000200)) sendmsg$key(r5, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:26 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x3e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200), 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) [ 514.501637][T14815] __nla_validate_parse: 2 callbacks suppressed [ 514.501648][T14815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 514.523134][T14817] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:26 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:39:26 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x41, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r6, 0x80287010, &(0x7f0000000200)) 13:39:26 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200), 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) [ 514.685094][T14824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 514.697824][T14826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:27 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200), 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) 13:39:27 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x42, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 13:39:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000200)) sendmsg$key(r5, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) syz_usb_connect(0x0, 0x3d, &(0x7f0000000100)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r5, @ANYRESHEX=r5], 0x0) 13:39:27 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 516.135777][T14842] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r5) 13:39:27 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r1, 0x0, 0x5, 0x0) [ 516.185443][T14848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 516.553885][ T7] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 516.743868][ T7] usb 2-1: device descriptor read/64, error 18 [ 517.013793][ T7] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 517.203848][ T7] usb 2-1: device descriptor read/64, error 18 [ 517.324849][ T7] usb usb2-port1: attempt power cycle 13:39:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet_icmp_raw(0x2, 0x3, 0x1) 13:39:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:29 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x43, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:29 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r1, 0x0, 0x5, 0x0) 13:39:29 executing program 5 (fault-call:11 fault-nth:0): r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 517.747029][T14876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 517.751821][T14881] FAULT_INJECTION: forcing a failure. [ 517.751821][T14881] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 517.767548][T14882] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 517.771711][T14881] CPU: 1 PID: 14881 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 517.787459][T14881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.797520][T14881] Call Trace: [ 517.800823][T14881] dump_stack+0x107/0x163 [ 517.805158][T14881] should_fail.cold+0x5/0xa [ 517.809649][T14881] _copy_to_user+0x2c/0x150 [ 517.814216][T14881] simple_read_from_buffer+0xcc/0x160 [ 517.819597][T14881] proc_fail_nth_read+0x187/0x220 [ 517.824603][T14881] ? proc_exe_link+0x1d0/0x1d0 [ 517.829394][T14881] ? security_file_permission+0x248/0x560 [ 517.835177][T14881] ? proc_exe_link+0x1d0/0x1d0 [ 517.839934][T14881] vfs_read+0x1b5/0x570 [ 517.844168][T14881] ksys_read+0x12d/0x250 [ 517.848396][T14881] ? vfs_write+0x700/0x700 [ 517.852798][T14881] ? syscall_enter_from_user_mode+0x1d/0x50 [ 517.858694][T14881] do_syscall_64+0x2d/0x70 [ 517.863099][T14881] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 517.868973][T14881] RIP: 0033:0x4177b1 [ 517.872860][T14881] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:39:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:39:29 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x44, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 517.892447][T14881] RSP: 002b:00007fd224e16c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 517.900891][T14881] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004177b1 [ 517.908847][T14881] RDX: 000000000000000f RSI: 00007fd224e16cb0 RDI: 0000000000000003 [ 517.916800][T14881] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 517.924750][T14881] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 517.932703][T14881] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:39:29 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 518.013220][T14886] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 518.027641][T14887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 518.045474][ T7] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 518.263331][ T7] usb 2-1: device descriptor read/8, error -61 [ 518.533750][ T7] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 518.703716][ T7] usb 2-1: device descriptor read/8, error -61 [ 518.834285][ T7] usb usb2-port1: unable to enumerate USB device 13:39:30 executing program 1 (fault-call:11 fault-nth:0): r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:39:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:39:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x45, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:30 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r1, 0x0, 0x5, 0x0) 13:39:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 519.252783][T14915] FAULT_INJECTION: forcing a failure. [ 519.252783][T14915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.273655][T14915] CPU: 0 PID: 14915 Comm: syz-executor.1 Not tainted 5.10.0-rc3-syzkaller #0 [ 519.282448][T14915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.292515][T14915] Call Trace: [ 519.295821][T14915] dump_stack+0x107/0x163 [ 519.300165][T14915] should_fail.cold+0x5/0xa [ 519.304684][T14915] _copy_to_user+0x2c/0x150 [ 519.309207][T14915] simple_read_from_buffer+0xcc/0x160 [ 519.314596][T14915] proc_fail_nth_read+0x187/0x220 [ 519.319634][T14915] ? proc_exe_link+0x1d0/0x1d0 [ 519.324406][T14915] ? security_file_permission+0x248/0x560 [ 519.330160][T14915] ? proc_exe_link+0x1d0/0x1d0 [ 519.334934][T14915] vfs_read+0x1b5/0x570 [ 519.339103][T14915] ksys_read+0x12d/0x250 [ 519.343357][T14915] ? vfs_write+0x700/0x700 [ 519.347787][T14915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 519.353695][T14915] do_syscall_64+0x2d/0x70 [ 519.358117][T14915] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 519.364030][T14915] RIP: 0033:0x4177b1 [ 519.367933][T14915] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 519.387562][T14915] RSP: 002b:00007f46facf3c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 13:39:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:31 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x46, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:31 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 519.395994][T14915] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004177b1 [ 519.403980][T14915] RDX: 000000000000000f RSI: 00007f46facf3cb0 RDI: 0000000000000003 [ 519.411973][T14915] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 519.419961][T14915] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 519.427945][T14915] R13: 000000000169fb7f R14: 00007f46facf49c0 R15: 000000000118bf2c 13:39:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:31 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 519.540168][T14925] __nla_validate_parse: 2 callbacks suppressed [ 519.540179][T14925] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 519.589226][T14928] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:32 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0x538, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8}, {0x1dc, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0xffffff81}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x16400}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}]}}]}, 0x538}, 0x1, 0x0, 0x0, 0x80}, 0x4000081) 13:39:32 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x47, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:32 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, 0x0, 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) 13:39:32 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 521.098611][T14950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 521.131423][T14953] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYRESHEX], 0xa0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 521.148024][T14952] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:39:32 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x48, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:33 executing program 2: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:39:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 521.294315][T14966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 521.330946][T14971] __report_access: 7 callbacks suppressed 13:39:33 executing program 2: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 521.330961][T14971] ptrace attach of "/root/syz-executor.2"[14969] was attempted by "/root/syz-executor.2"[14971] [ 521.339211][T14970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 521.474811][T14978] ptrace attach of "/root/syz-executor.2"[14977] was attempted by "/root/syz-executor.2"[14978] 13:39:34 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:35 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000040)=0x8001) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r5, 0x30, 0x0, @ib={0x1b, 0x3, 0x8, {"14df3468fe75d209514dd81c06093082"}, 0x3, 0x8000, 0x100000000}}}, 0x90) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:35 executing program 2: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:39:35 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x49, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:35 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, 0x0, 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) 13:39:35 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3f}, {0x6, 0x11, 0x6}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000011) 13:39:35 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:35 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) syz_open_dev$ttys(0xc, 0x2, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) [ 524.142443][T15000] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 524.164674][T15006] ptrace attach of "/root/syz-executor.2"[15001] was attempted by "/root/syz-executor.2"[15006] 13:39:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 524.210228][T15011] ptrace attach of "/root/syz-executor.5"[15004] was attempted by "/root/syz-executor.5"[15011] [ 524.213500][T15012] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:36 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x80, 0x0) ioctl$IOCTL_GET_NUM_DEVICES(r2, 0x40046104, &(0x7f0000000180)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 524.277320][T15023] ptrace attach of "/root/syz-executor.1"[15019] was attempted by "/root/syz-executor.1"[15023] 13:39:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:39:36 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x4a, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 524.325416][T15025] ptrace attach of "/root/syz-executor.2"[15024] was attempted by "/root/syz-executor.2"[15025] 13:39:36 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x2710}}, 0x100) 13:39:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 524.418884][T15035] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 524.422259][T15034] ptrace attach of "/root/syz-executor.5"[15028] was attempted by "/root/syz-executor.5"[15034] [ 524.429661][T15036] ptrace attach of "/root/syz-executor.2"[15033] was attempted by "/root/syz-executor.2"[15036] [ 524.524948][T15047] ptrace attach of "/root/syz-executor.1"[15043] was attempted by "/root/syz-executor.1"[15047] [ 524.580136][T15052] ptrace attach of "/root/syz-executor.2"[15049] was attempted by "/root/syz-executor.2"[15052] 13:39:36 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, 0x0, 0x2) splice(r0, 0x0, r2, 0x0, 0x5, 0x0) 13:39:36 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x5e}) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xea3, 0x400002) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:36 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x4b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:36 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:36 executing program 2: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:39:36 executing program 2: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 525.023286][T15073] __nla_validate_parse: 1 callbacks suppressed [ 525.023296][T15073] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:36 executing program 2: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:39:36 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000040)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 525.083837][T15083] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:36 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:36 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x4c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 525.277976][T15102] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 525.313533][T15104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:37 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x2) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x5, 0x0) 13:39:37 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) vmsplice(r2, &(0x7f00000004c0)=[{&(0x7f00000017c0)="ed73a7a7fe658550c071c8e850d3d68cb4", 0x11}], 0x51, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r3, &(0x7f0000001740)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f0000001500)=[{&(0x7f0000000180)=""/176, 0xb0}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/103, 0x67}], 0x5, &(0x7f0000001640)=[@mask_fadd={0x58, 0x114, 0x8, {{0xffff8001, 0x36}, &(0x7f0000000480)=0x5, &(0x7f0000001580)=0x5, 0x5, 0x3, 0x0, 0x8, 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0x4e, 0x6}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xfffffffb}, @mask_cswp={0x58, 0x114, 0x9, {{0xc62, 0x6}, &(0x7f00000015c0)=0x3, &(0x7f0000001600)=0x1000, 0x0, 0x0, 0x9, 0x4, 0x40, 0x1}}], 0xe0, 0x40000}, 0x4080) 13:39:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:37 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x4d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 525.909059][T15115] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 525.971909][T15120] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:39 executing program 5: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDCTL_FM_4OP_ENABLE(0xffffffffffffffff, 0x4004510f, &(0x7f0000000040)=0x9) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) tkill(0xffffffffffffffff, 0x1a) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x4000000000000000, 0x0) 13:39:39 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:39 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x2) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x5, 0x0) 13:39:39 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x4e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:39 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400000, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x48, 0x140b, 0x100, 0x70bd2d, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x1}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0xc7b08ea01d15f175) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000840)={[0x3]}, 0x8, 0x800) sendmsg$TCPDIAG_GETSOCK(r3, &(0x7f0000000c40)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000c00)={&(0x7f0000000180)={0x328, 0x12, 0x200, 0x70bd28, 0x25dfdbff, {0x1a, 0x6, 0xc, 0xf9, {0x4e24, 0x4e22, [0x4, 0x7, 0x6, 0x4], [0x1, 0x4, 0x8001, 0x8], 0x0, [0x9, 0x7]}, 0x40, 0x19cc}, [@INET_DIAG_REQ_BYTECODE={0x107, 0x1, "6863588f203757fae3076b6e9578ecd60723d4e62dca1c564196f8a7f1f6b5a31c1512d37e9a1e449c18e027023fa000221770436969b4ca47728f369d619782d366ce89802dd647dde9ae5119587cbb96c613ac7df1ddb283d67580e43e8b89d6de5f41bc043b2ee46cd00d0491198c073bf159eabec95c65fdbcd62a3dbdadef4ca764aa3d4900e1e4c9f02b513c39461afe619fdb417e10fbd7ce84bbf7f5d972a6d9d369ee25c696b0cea61a8eb9f4d1abb0e9b02f9567780959bf264c3e411b0a3446aeb5d0e1566585149d3f91975a29803f6c002d8ffb402794d1757aad86dac67b8a55d70da041b708c3a71933e8799dba6fbdee0e91aad8f9087366f5e0cf"}, @INET_DIAG_REQ_BYTECODE={0x54, 0x1, "479fde2f9fe6fc8032af8b1e25f0465581de9a1293d398651674b861e3653806997418eb235a36d42fac64742428aee226ce7a8cb7b93793e4d9fa9951f211c9eae0b2effc0fd124937c1d67549f37a7"}, @INET_DIAG_REQ_BYTECODE={0x103, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x79, 0x1, "da4fc86030109c7f5add9a56bc8df3181422bb2f178da2c53fd8af102356d74466a94c74257a583a61c2d227044dc14e5c1b5699a588d2d91492bf640bf877e0a4f2199c65c9b41e0be5d4abb2aaa05d55f9e4f728fc8af4929f47b2f58de5b5488603e8cddaa5a9030ff404d0c529bda015945fc7"}]}, 0x328}, 0x1, 0x0, 0x0, 0x4000000}, 0x200000d4) 13:39:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 528.027182][T15132] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 528.050546][T15137] __report_access: 4 callbacks suppressed [ 528.050561][T15137] ptrace attach of "/root/syz-executor.5"[15134] was attempted by "/root/syz-executor.5"[15137] [ 528.066931][T15138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:39 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) waitid(0x1, r2, 0x0, 0x80000000, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000040)={0x3, 0xfffffff9, 0x7}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:39 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r1, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[], 0x2) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x5, 0x0) 13:39:39 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x4f, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 528.170674][T15148] ptrace attach of "/root/syz-executor.1"[15143] was attempted by "/root/syz-executor.1"[15148] 13:39:40 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080)={'bond0', 0x32, 0x39}, 0x8) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x3, 0x0, 0xfffffffffffffe75, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = getpgid(r0) capset(&(0x7f0000000040)={0x20080522, r2}, &(0x7f0000000180)={0x0, 0x81, 0x3, 0x2040, 0x3ff, 0xcee5}) ptrace$cont(0x7, r1, 0x0, 0x0) getpgrp(r2) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) pkey_free(0xffffffffffffffff) 13:39:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:40 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/time\x00') ptrace$cont(0x7, r1, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000180)={0x274, 0x0, 0x2, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}, @CTA_EXPECT_NAT={0x138, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @private0={0xfc, 0x0, [], 0x1}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private0={0xfc, 0x0, [], 0x1}}}}]}, @CTA_EXPECT_NAT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @local}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @local}}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @remote}}}]}]}, @CTA_EXPECT_TUPLE={0x38, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x2f}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_MASTER={0x6c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x42}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @rand_addr=0x64010102}}}]}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x3}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x6}, @CTA_EXPECT_MASK={0x28, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010100}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x24040880}, 0x0) [ 528.278436][T15157] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) [ 528.347485][T15162] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:40 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)=ANY=[@ANYBLOB="020e000014000000001000000000000005000600000000000a000000000000000000000000000000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a00000000000000fc0100"/157], 0xa0}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)="94611d6f2b3bb8a3703da0a36c24247e9bdc496845420a81ea5eb807d4f6c11c452d0379bd7c072d719b9aacb184c0d8fd7db5c2a0dfa71ca2cd9470df65add26de4744dd7361275b024a5da7d16fd692721d273739924993ea84e806583902528535c445632f92ccaa6de10ecc89656", 0x70, r2}, 0x68) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x50, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 528.449960][T15176] ptrace attach of "/root/syz-executor.1"[15173] was attempted by "/root/syz-executor.1"[15176] 13:39:40 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) 13:39:40 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x8001) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5, @time={0x1ff}, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 528.536397][T15183] ptrace attach of "/root/syz-executor.5"[15181] was attempted by "/root/syz-executor.5"[15183] 13:39:40 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x51, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 528.635572][T15200] ptrace attach of "/root/syz-executor.1"[15194] was attempted by "/root/syz-executor.1"[15200] [ 528.671882][T15206] ptrace attach of "/root/syz-executor.5"[15201] was attempted by "/root/syz-executor.5"[15206] 13:39:40 executing program 1: gettid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000200)={0x6, 0x4c, 0x80}) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {0x0, 0x3}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x5c, @rand_addr=0x64010100, 0x4e24, 0x3, 'none\x00', 0x9, 0x3f, 0x79}, 0x2c) 13:39:40 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:40 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) 13:39:40 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000180)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x8, 0x4f2, 0x1123, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x7, 0x0, 0x5, [{{0x9, 0x4, 0x0, 0x6, 0x2, 0x3, 0x1, 0x1, 0x70, {0x9, 0x21, 0x200, 0x17, 0x1, {0x22, 0x2d3}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x7, 0x81, 0x5}}}}}]}}]}}, &(0x7f0000000500)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x310, 0x7, 0x5, 0x20, 0x20, 0x5}, 0x54, &(0x7f0000000200)={0x5, 0xf, 0x54, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0x0, 0x1, 0x3, 0x200}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xd, 0x8, 0x0, 0x1}, @ext_cap={0x7, 0x10, 0x2, 0xa, 0x6, 0x2, 0x5}, @ptm_cap={0x3}, @ss_container_id={0xfffffffffffffcfb, 0x10, 0x4, 0xc7, "b2a23b347fbbdba6c8ca446f8e3f9f84"}, @ssp_cap={0x20, 0x10, 0xa, 0x80, 0x5, 0x2, 0xf00, 0xe539, [0xc0f0, 0x0, 0x0, 0xff3f00, 0xff0000]}]}, 0x4, [{0x44, &(0x7f0000000280)=@string={0x44, 0x3, "8b71553ec584a19bb07effd79a8b89d4350ed34693b5586213a5b795bfad5e7528758b9d6c58e3c59f4bb876edfa1a3194655cd96e60297cbb0ed2fb634461d096f6"}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x445}}, {0xc5, &(0x7f0000000580)=@string={0xc5, 0x3, "71ce5e5242ef959597a6e72910db76e8ff9caefa5a7acb699bbd25dcc83b592e570c9ff2aead429e506e9271716023829f3fea8f7783f9b0f4b24ebccfa4c31888a72d5ad64fb5fc6f1e8adf60f1c0726488b4f12b675c0460a81a45755e9ce6b4e59d0ae06b857c7573eb2166b637b46b1c670a946eb81a0b0f0652a670f709f8a8addc708d5646fe16f1145f8fcd1602b95c4bd0cdb780f3491d6c433c7cb2518b455a0bcf0444e2187b1172d7ec8646d9e2216e1bcb5152517f37794201ceb7fc48"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x44a}}]}) syz_usb_disconnect(r2) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = fsmount(0xffffffffffffffff, 0x1, 0xff) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)=0x6, 0x4) [ 528.832263][T15222] ptrace attach of "/root/syz-executor.1"[15214] was attempted by "/root/syz-executor.1"[15222] 13:39:40 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x8, 0x2, [0x4, 0x9]}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e24, @multicast1}}}, 0x84) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x52, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:40 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) [ 529.012604][T15243] ptrace attach of "/root/syz-executor.1"[15235] was attempted by "/root/syz-executor.1"[15243] 13:39:40 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x53, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:40 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:39:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:41 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0x24048040, &(0x7f0000000200)={0x2, 0x4e22}, 0x10) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0x2) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 13:39:41 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x54, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 529.262379][ T9674] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 529.522352][ T9674] usb 6-1: Using ep0 maxpacket: 8 [ 529.672499][ T9674] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 529.692504][ T9674] usb 6-1: config 1 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 529.715725][ T9674] usb 6-1: config 1 interface 0 has no altsetting 0 [ 529.912929][ T9674] usb 6-1: New USB device found, idVendor=04f2, idProduct=1123, bcdDevice= 0.40 [ 529.922151][ T9674] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 529.931188][ T9674] usb 6-1: Product: 칱剞閕ꚗ⧧鳿类穚構붛㯈⹙౗궮鹂湐熒恱舣㾟迪荷냹담뱎꓏ᣃꞈ娭俖ﲵṯ狀衤末ќꡠ䔚幵ઝ毠粅獵⇫뙦됷ᱫ੧溔᪸་分炦৷꣸走䙖᛾ᓱ轟ᛍ뤂䭜췐肷䧳氝㱃뉼譑婅켋䐄ᣢᅻ흲蛬⇢᭮凋兒㝿䉹츁ﲷ [ 529.960229][ T9674] usb 6-1: Manufacturer: х [ 529.965184][ T9674] usb 6-1: SerialNumber: ъ [ 530.462350][ T9674] usbhid 6-1:1.0: can't add hid device: -71 [ 530.473329][ T9674] usbhid: probe of 6-1:1.0 failed with error -71 [ 530.484055][ T9674] usb 6-1: USB disconnect, device number 2 [ 531.212173][ T7] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 531.452961][ T7] usb 6-1: Using ep0 maxpacket: 8 [ 531.572847][ T7] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 531.583104][ T7] usb 6-1: config 1 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 531.596053][ T7] usb 6-1: config 1 interface 0 has no altsetting 0 [ 531.762182][ T7] usb 6-1: New USB device found, idVendor=04f2, idProduct=1123, bcdDevice= 0.40 [ 531.771704][ T7] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 531.780171][ T7] usb 6-1: Product: 칱剞閕ꚗ⧧鳿类穚構붛㯈⹙౗궮鹂湐熒恱舣㾟迪荷냹담뱎꓏ᣃꞈ娭俖ﲵṯ狀衤末ќꡠ䔚幵ઝ毠粅獵⇫뙦됷ᱫ੧溔᪸་分炦৷꣸走䙖᛾ᓱ轟ᛍ뤂䭜췐肷䧳氝㱃뉼譑婅켋䐄ᣢᅻ흲蛬⇢᭮凋兒㝿䉹츁ﲷ [ 531.808085][ T7] usb 6-1: Manufacturer: х [ 531.812726][ T7] usb 6-1: SerialNumber: ъ 13:39:43 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="646794c1cb4c379ba53b0ccf5300000000", 0x11}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:43 executing program 1: r0 = gettid() r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r2, &(0x7f0000000740)={&(0x7f0000000300)=@l2tp={0x2, 0x0, @private}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000380)=""/22, 0x16}, {&(0x7f00000003c0)=""/213, 0xd5}, {&(0x7f0000000500)=""/16, 0x10}, {&(0x7f0000000540)=""/179, 0xb3}], 0x4, &(0x7f0000000640)=""/209, 0xd1}, 0x1) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil}) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x200, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x6400000c) ptrace$setopts(0x4206, r3, 0x0, 0x80011) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000780)=[{0x6e, 0x40, 0x4, 0xba, @time={0x9}, {0x0, 0x3}, {0x3, 0x3}, @addr={0xff, 0x6}}, {0x6, 0x7, 0xe4, 0x6, @time={0x6, 0x3}, {0x7, 0xf8}, {0xff}, @connect={{0x1f, 0x5}, {0x5, 0x81}}}, {0x7, 0x5, 0x40, 0xff, @time={0x1}, {0x6, 0x9}, {0x40, 0x7}, @raw32={[0x1, 0x2, 0x3]}}, {0x5, 0x81, 0x0, 0x40, @time={0x3, 0x4}, {0x4, 0x1f}, {0x6, 0x6}, @addr={0x5, 0x4e}}, {0x40, 0x8, 0x0, 0x3, @tick=0x1, {0x7, 0x8}, {0x81, 0x9}, @raw8={"2f376feeb37aac7d2f8f7885"}}], 0x8c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:39:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:43 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x55, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:43 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:43 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000180)={0x4000, 0x7ff, 0x4, 0x100}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 532.056935][T15304] __nla_validate_parse: 10 callbacks suppressed [ 532.056946][T15304] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 532.096172][T15311] ptrace attach of "/root/syz-executor.5"[15307] was attempted by "/root/syz-executor.5"[15311] 13:39:43 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 532.112266][ T7] usbhid 6-1:1.0: can't add hid device: -71 [ 532.118655][ T7] usbhid: probe of 6-1:1.0 failed with error -71 [ 532.120262][T15313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:43 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)=ANY=[@ANYBLOB="020e000014000000001000000000000005000600000000000a000000000000000000000000000000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a00000000000000fc0100"/157], 0xa0}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000180)="94611d6f2b3bb8a3703da0a36c24247e9bdc496845420a81ea5eb807d4f6c11c452d0379bd7c072d719b9aacb184c0d8fd7db5c2a0dfa71ca2cd9470df65add26de4744dd7361275b024a5da7d16fd692721d273739924993ea84e806583902528535c445632f92ccaa6de10ecc89656", 0x70, r2}, 0x68) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 532.166730][ T7] usb 6-1: USB disconnect, device number 3 13:39:44 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x6c890e00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000180)=[0x1, 0x58, 0x2], 0x3, 0x800, 0x0, 0xffffffffffffffff}) renameat2(r3, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000240)='./file0/file0\x00', 0x0) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 13:39:44 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x1b) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000040)={0x3, 'veth0_virt_wifi\x00', {0x6}, 0x7}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:44 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x56, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:44 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:44 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x5, @loopback}, {0x2, 0x4e22, @remote}, 0x0, 0x0, 0x0, 0x0, 0x861, &(0x7f0000000040)='erspan0\x00', 0x3, 0x73dc, 0x3}) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 532.326904][T15335] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 532.361693][T15338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:44 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000001c0)="e40368a0d3433090e888cb31f8ffffff13873810dd42", 0x16}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_STREAMOFF(r3, 0x40045613, &(0x7f0000000040)=0x5) tkill(r1, 0x40) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$sndseq(r5, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {0x4}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 532.378315][T15339] ptrace attach of "/root/syz-executor.1"[15334] was attempted by "/root/syz-executor.1"[15339] 13:39:44 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x57, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 532.507067][T15350] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 532.533437][T15352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:46 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:46 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:46 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f00000001c0)=""/172, &(0x7f0000000280)=0xac) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ustat(0x4, &(0x7f00000002c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:46 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) getpeername$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f00000001c0)={0x6, 0x80000001, 0x3}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 535.160501][T15375] __report_access: 2 callbacks suppressed [ 535.160516][T15375] ptrace attach of "/root/syz-executor.1"[15370] was attempted by "/root/syz-executor.1"[15375] 13:39:47 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) vmsplice(r2, &(0x7f00000004c0)=[{&(0x7f00000017c0)="ed73a7a7fe658550c071c8e850d3d68cb4", 0x11}], 0x51, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r3, &(0x7f0000001740)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f0000001500)=[{&(0x7f0000000180)=""/176, 0xb0}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/103, 0x67}], 0x5, &(0x7f0000001640)=[@mask_fadd={0x58, 0x114, 0x8, {{0xffff8001, 0x36}, &(0x7f0000000480)=0x5, &(0x7f0000001580)=0x5, 0x5, 0x3, 0x0, 0x8, 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0x4e, 0x6}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xfffffffb}, @mask_cswp={0x58, 0x114, 0x9, {{0xc62, 0x6}, &(0x7f00000015c0)=0x3, &(0x7f0000001600)=0x1000, 0x0, 0x0, 0x9, 0x4, 0x40, 0x1}}], 0xe0, 0x40000}, 0x4080) 13:39:47 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x58, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:47 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, 0x44, 0x0, @time, {}, {}, @ext={0xd0, &(0x7f00000001c0)="8ca5d7b20aaca7f9e57d4322bfa953fd61f379f1e01e129f16b431ea8197cb07921cb9cd2107c903593502a8bdc7f49897fe9e39ffed844c4cfa74c884108b7c545f2474f83a5169ee9769f9d498b29f426c722b1bb4018b51796910c56a9d6a0627f178912033879060b2432c88203613c15336cc05a93d886238fb50a9780cf14b4fb185b82fd55c0284fcbe77da591eaa0812c1a944ead764dcd0991d7ea22e7ae3b294f7685d60255a4a1c22552f0375fb71c1bd6d97812f8d9fffa5a0d981677a3e36d0af124298484ac7a94cd3"}}, {0xf9, 0x3f, 0x8, 0x7f, @tick=0x8, {0xc0, 0x40}, {0x2, 0x86}, @note={0x2, 0x81, 0x5, 0x2, 0x9}}], 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:47 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:47 executing program 1: r0 = gettid() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40581, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)="02000000020319", 0x7}], 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x440500, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x18, 0x3f9, 0x300, 0x70bd29, 0x25dfdbff, {0x1, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4080}, 0x40050) tkill(r4, 0x40) write$sndseq(r5, &(0x7f0000000340)=[{0x6, 0x1, 0xf9, 0x6, @tick=0x4, {0x5, 0xcf}, {0x4}, @ext={0x3e, &(0x7f00000000c0)="6b4ff20d686d76e2986bced99a35097b2c408b34e0a9f156f239d61429a54cdd92852207f5661b9c9331096a47b9b9838d906770e41675b1b827b4414b70"}}, {0x7, 0xaa, 0x8, 0x2, @tick=0xfffffc00, {0x9, 0x1}, {0x0, 0x44}, @queue={0x6, {0x8000, 0x8c000000}}}, {0xe9, 0x6, 0x6, 0x8, @time={0x8, 0x3}, {0x1f, 0x6}, {0x76, 0x7}, @control={0x0, 0x7fffffff, 0x3}}, {0x0, 0x2, 0x2, 0xff, @tick=0x9fab, {0x1c, 0x7f}, {0x4, 0x81}, @raw32={[0x0, 0x9, 0x7]}}, {0x7, 0x6, 0xfc, 0x7, @time={0x6, 0x1ff}, {0xe1, 0x3}, {0x3f, 0x7}, @control={0x4, 0x8000, 0x73}}, {0x2, 0x0, 0x3, 0xc4, @tick=0x200, {0x4, 0x1}, {0x1, 0xf3}, @queue={0x7, {0x8, 0x1}}}], 0xa8) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x7, 0x4579) 13:39:47 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)=0x3) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0xff, 0x0, 0x0, 0x0, @time={0x80000000}, {0x0, 0x40}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 535.359533][T15387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 535.390266][T15392] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:47 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:47 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x59, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 535.606806][T15428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 535.633989][T15429] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:49 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:49 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x4b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:49 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:49 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x5a, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 538.236866][T15447] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 538.262854][T15450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) vmsplice(r2, &(0x7f00000004c0)=[{&(0x7f00000017c0)="ed73a7a7fe658550c071c8e850d3d68cb4", 0x11}], 0x51, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r3, &(0x7f0000001740)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f0000001500)=[{&(0x7f0000000180)=""/176, 0xb0}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/103, 0x67}], 0x5, &(0x7f0000001640)=[@mask_fadd={0x58, 0x114, 0x8, {{0xffff8001, 0x36}, &(0x7f0000000480)=0x5, &(0x7f0000001580)=0x5, 0x5, 0x3, 0x0, 0x8, 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0x4e, 0x6}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xfffffffb}, @mask_cswp={0x58, 0x114, 0x9, {{0xc62, 0x6}, &(0x7f00000015c0)=0x3, &(0x7f0000001600)=0x1000, 0x0, 0x0, 0x9, 0x4, 0x40, 0x1}}], 0xe0, 0x40000}, 0x4080) 13:39:50 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:50 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x5b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:50 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:50 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002000)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000006300)={0x50, 0x0, r3}, 0x50) creat(&(0x7f0000002100)='./file0/file0\x00', 0x0) syz_fuse_handle_req(r2, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)={0x90}, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r2, &(0x7f0000006a40)="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", 0x2000, &(0x7f0000008f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008e40)={0xa0, 0x0, 0x0, {{0x3, 0x0, 0x0, 0x0, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}}}}, 0x0}) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x42) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 538.466766][T15462] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 538.502467][T15470] ptrace attach of "/root/syz-executor.5"[15465] was attempted by "/root/syz-executor.5"[15470] 13:39:50 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:50 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101302, 0x0) ioctl$SOUND_OLD_MIXER_INFO(r2, 0x80304d65, &(0x7f0000000180)) getrusage(0xffffffffffffffff, &(0x7f00000001c0)) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x7f, 0x0, 0x0, 0x1, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974e87b79b1c2ed"}}], 0x1c) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x202001, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f00000002c0)="1e36c40c1446d303eb032a7af0c1ba7ff68cbf65d0720acbff3936c911c8cd1407bfc88f66cc956c6a3befea2970b101645cbd39f4fbb7") ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{0xff, 0x7f, 0x8, 0x20}, {0x2, 0x9, 0x7f, 0x200}, {0x2, 0x96, 0x0, 0x3}, {0x2, 0x3, 0x40, 0x1}, {0xfffe, 0x4, 0x5, 0x800}]}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 538.524401][T15472] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:50 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x5c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 538.698323][T15483] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 538.768442][T15488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:53 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:53 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:53 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x7, 0x51, 0x80, 0x9a1}, {0x1af, 0x57, 0x80, 0xe4f20ee7}, {0x2, 0x1, 0x9, 0x9c80}, {0x401, 0x5, 0x5, 0xffffff7f}, {0x9b, 0x20, 0x2, 0x1}, {0x9, 0x0, 0x8, 0x9}, {0x3ff, 0x80, 0x8, 0x81}]}) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='./file0\x00') clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280)='batadv\x00') ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000340)={'sit0\x00', &(0x7f00000002c0)={'ip6tnl0\x00', 0x0, 0x29, 0x1, 0x0, 0xfffffff9, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x7, 0x7810, 0x36d, 0x4}}) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, r2, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004048) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x5d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 541.294289][T15502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 541.301806][ T34] audit: type=1326 audit(1605274793.057:4): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=15498 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 [ 541.319210][T15506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:53 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) vmsplice(r2, &(0x7f00000004c0)=[{&(0x7f00000017c0)="ed73a7a7fe658550c071c8e850d3d68cb4", 0x11}], 0x51, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r3, &(0x7f0000001740)={&(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010100}, 0x10, &(0x7f0000001500)=[{&(0x7f0000000180)=""/176, 0xb0}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/103, 0x67}], 0x5, &(0x7f0000001640)=[@mask_fadd={0x58, 0x114, 0x8, {{0xffff8001, 0x36}, &(0x7f0000000480)=0x5, &(0x7f0000001580)=0x5, 0x5, 0x3, 0x0, 0x8, 0x40}}, @rdma_dest={0x18, 0x114, 0x2, {0x4e, 0x6}}, @zcopy_cookie={0x18, 0x114, 0xc, 0xfffffffb}, @mask_cswp={0x58, 0x114, 0x9, {{0xc62, 0x6}, &(0x7f00000015c0)=0x3, &(0x7f0000001600)=0x1000, 0x0, 0x0, 0x9, 0x4, 0x40, 0x1}}], 0xe0, 0x40000}, 0x4080) 13:39:53 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x8}, 0xc) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x5e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 541.532612][T15518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 541.548785][T15522] ptrace attach of "/root/syz-executor.1"[15519] was attempted by "/root/syz-executor.1"[15522] [ 541.596884][T15526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:53 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000040)={0x3, 0x32314752, 0x1, @stepwise={0x20, 0x5a932606, 0x8001, 0x1ff, 0xdc57, 0x9}}) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8024082}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000ffdbdf253000000008000300", @ANYRES32=r4, @ANYBLOB="0c0099000100000063000000060036003700000006003600200000000600360026000000060036002b000000060036002a000000060036000c0098000006003600120000000600360034000000"], 0x68}}, 0x4090) tkill(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e22, 0x10001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x310ff060}}, 0x0, 0x0, 0x2, 0x0, "8c331f4e5eeff78175d25cee51ec66d80b47e87134fb734dc6ead75bb6aef7a4754b3d7acd1cdaeadd8fea64119a20adbded62c97a2fc360043c21daee82d6432edf2b360f45b66fd988434e3dee8ff5"}, 0xd8) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x5f, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:53 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 542.082953][ T34] audit: type=1326 audit(1605274793.847:5): auid=0 uid=0 gid=0 ses=4 subj==unconfined pid=15509 comm="syz-executor.5" exe="/root/syz-executor.5" sig=9 arch=c000003e syscall=228 compat=0 ip=0x460d1a code=0x0 13:39:56 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:56 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x60, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:56 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 544.371828][T15551] __nla_validate_parse: 2 callbacks suppressed [ 544.371840][T15551] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 544.399009][T15555] ptrace attach of "/root/syz-executor.5"[15553] was attempted by "/root/syz-executor.5"[15555] [ 544.445486][T15559] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:56 executing program 0: r0 = gettid() r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40581, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x1) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)="02000000020319", 0x7}], 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x440500, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x18, 0x3f9, 0x300, 0x70bd29, 0x25dfdbff, {0x1, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4080}, 0x40050) tkill(r4, 0x40) write$sndseq(r5, &(0x7f0000000340)=[{0x6, 0x1, 0xf9, 0x6, @tick=0x4, {0x5, 0xcf}, {0x4}, @ext={0x3e, &(0x7f00000000c0)="6b4ff20d686d76e2986bced99a35097b2c408b34e0a9f156f239d61429a54cdd92852207f5661b9c9331096a47b9b9838d906770e41675b1b827b4414b70"}}, {0x7, 0xaa, 0x8, 0x2, @tick=0xfffffc00, {0x9, 0x1}, {0x0, 0x44}, @queue={0x6, {0x8000, 0x8c000000}}}, {0xe9, 0x6, 0x6, 0x8, @time={0x8, 0x3}, {0x1f, 0x6}, {0x76, 0x7}, @control={0x0, 0x7fffffff, 0x3}}, {0x0, 0x2, 0x2, 0xff, @tick=0x9fab, {0x1c, 0x7f}, {0x4, 0x81}, @raw32={[0x0, 0x9, 0x7]}}, {0x7, 0x6, 0xfc, 0x7, @time={0x6, 0x1ff}, {0xe1, 0x3}, {0x3f, 0x7}, @control={0x4, 0x8000, 0x73}}, {0x2, 0x0, 0x3, 0xc4, @tick=0x200, {0x4, 0x1}, {0x1, 0xf3}, @queue={0x7, {0x8, 0x1}}}], 0xa8) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x7, 0x4579) 13:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:56 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000040)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/204, 0xcc}], 0x4, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:56 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x61, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 544.628517][T15568] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 544.666218][T15573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:56 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="e1f2f8bdd14a06ef1888bd01daba9b0a9ce1ec25a08ab13b107d986ed2fd3cd4e03d299014711bf3986246a9d4522a64c792fbf31cd8ab4f79fc591061bdd264141e417b24fdcc73dbbe9c7bf41fbd4c0c3dba4c335133a3599403130fc6cd615839bbf0984200e28eea6a8cb44c7c791cd5b3d9fa09e55a2843776e188a21314e0f43f0356344bb783f8ca2ec0da16edccb9a8ae47827bf16e1e839f45f828a9e4ce7c3d851ddf94594a7c273807c78a42c332357c8f3c88e2e9f749e8a", 0xbe, 0x0) keyctl$read(0xb, r2, &(0x7f0000000280)=""/248, 0xf8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00000062c98a990000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000b40)={'ip6_vti0\x00', &(0x7f0000000ac0)={'sit0\x00', 0x0, 0x4, 0x1, 0x6, 0x2, 0x2, @local, @private0, 0x1, 0x80, 0x800, 0x7}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000c40)={&(0x7f0000000b80)={0x8c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20000010}, 0xc4) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x8c}, {}, {0x0, 0xfc}, @queue={0x6, {0xfff, 0x8}}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 544.678866][T15575] ptrace attach of "/root/syz-executor.5"[15571] was attempted by "/root/syz-executor.5"[15575] 13:39:56 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) process_vm_readv(r2, &(0x7f0000002700)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000180)=""/65, 0x41}, {&(0x7f0000000040)=""/8, 0x8}, {&(0x7f0000000200)=""/160, 0xa0}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/139, 0x8b}, {&(0x7f0000002500)=""/195, 0xc3}, {&(0x7f0000002600)=""/250, 0xfa}], 0x9, &(0x7f0000000480), 0x0, 0x0) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000002880)={0x21, 0x37, 0x2, {0x2, 0x80000000, 0x4, r0, 0x3, '@+\''}}, 0x21) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002800)={&(0x7f00000027c0)={0x2c, 0x13, 0xa, 0x0, 0x0, 0x0, {0xc, 0x0, 0x9}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044c81}, 0x20000000) ptrace$setregs(0xd, r1, 0x4, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:56 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:56 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x62, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 544.850927][T15587] ptrace attach of "/root/syz-executor.5"[15581] was attempted by "/root/syz-executor.5"[15587] [ 544.866035][T15589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 544.881419][T15591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:59 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:59 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x5, 0x52}}}}, [""]}, 0x20}}, 0x8000) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000040)={0xc, 0x1, 0x5, {0x5, 0x4, 0x7, 0x8}}) 13:39:59 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x63, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:39:59 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000002c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001480)=ANY=[@ANYBLOB="4c150000", @ANYRES16=r1, @ANYBLOB="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"], 0x154c}}, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xffff8001, 0x1a}}}}, [@NL80211_ATTR_COALESCE_RULE_CONDITION={0x8, 0x2, 0x1}, @NL80211_ATTR_COALESCE_RULE_CONDITION={0x8, 0x2, 0x1}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x6}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x40844}, 0x4000000) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) socket$rxrpc(0x21, 0x2, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000040)={@dev, @loopback}, &(0x7f0000000180)=0xc) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 547.453560][T15609] ptrace attach of "/root/syz-executor.1"[15604] was attempted by "/root/syz-executor.1"[15609] [ 547.465000][T15608] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 547.479772][T15613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:59 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) pidfd_open(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040000}, 0x4000040) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') socket$kcm(0x29, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x4}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) 13:39:59 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x64, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 547.679513][T15625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 547.708176][T15630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:39:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:39:59 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x65, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 547.748825][T15632] ptrace attach of "/root/syz-executor.1"[15627] was attempted by "/root/syz-executor.1"[15632] 13:39:59 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000040)={0x0, 0xbc, 0xf9}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'blake2s-256-generic\x00'}}, &(0x7f0000000200)="ac45cfa2b8b618a7c68c0d3ad3886dfe5e64d3549c17be2f6e8e4dd87be28653d9927972431c1993b8672f6ef8ddb2169241620b6da37ad72b7189ce999775d3df2f00c58c9a359e56529c0dbcfdbc9bf753bc4563e4c3f7025a6b353a4c63524f959d4a09410365e3b7770c692fae736fbb90d22c60eec47bbe8e98ec868413f9b1f4fe7096da49297f40d07b50011bac1070b1f943b3949f332caefffaa3754dc162fc51b30229769b2c8465d9cb148b22a72fd3e03440fbc74cc2", &(0x7f00000002c0)=""/249) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:39:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 547.964115][T15647] ptrace attach of "/root/syz-executor.1"[15645] was attempted by "/root/syz-executor.1"[15647] 13:40:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:02 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:02 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x66, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:02 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000040)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:02 executing program 5: ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f0000000280)) r0 = gettid() r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000200)={0x1, 0x79, &(0x7f0000000180)="bd78a84a455dde35976960aee36da103d5b12a60ffdeba0422c8269ac16cd76e859af96d3efe3da909aafef11f00c9f13483c9bdc25f84ec9cbe8fcb3c403db28985fa239d7766685d85027c99fbb3cb76b0694e8870179740a3db4a897c2b87be924972003437b3d90a54ef4bbba29b0c0c45a547f7ba964d"}) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={0x0, 0x8}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000340)=r3, 0x4) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f0000000240)) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:40:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 550.514433][T15658] __nla_validate_parse: 2 callbacks suppressed [ 550.514444][T15658] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 550.557408][T15669] ptrace attach of "/root/syz-executor.1"[15665] was attempted by "/root/syz-executor.1"[15669] [ 550.587137][T15673] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:02 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20000, 0x80) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000180)="dabd234b4e97e44cc77267bd8372b5bda1eeb53131d9be2dd36fdf2b7c4ff7cc04ecd779be675ff5b490bf7690f865136ffdb8e7a0292083be7cf3f4423f96b1072fdc6d4d4ee251cbde4261555a1b203b30e31d906f2db05616331d0092f79610fcbf1004a6ea56538fea41bdd3a2c25945ca98cfa165c044286645696bab79c834757004b36e0c510d56e9919c560d243110c3588a8399ba0ae06657960a751d267d14184adc09c57ef5363652bfc7965ea0eb7dd582108ae04431bacd5fb0da2e83212dd9b8457e1a05c94724422f103bb2341c1378891c26eb9ea93ce69d396b5c5db43a9504af82aaf4e3d71eb127afba6b803460934db49cb725bc0dd4") r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:40:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:40:02 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x67, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:02 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x3, @tick=0xd8, {}, {0x8}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:02 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) [ 550.774031][T15688] ptrace attach of "/root/syz-executor.1"[15682] was attempted by "/root/syz-executor.1"[15688] [ 550.802269][T15689] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 550.847389][T15690] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 550.923484][T15699] ptrace attach of "/root/syz-executor.1"[15696] was attempted by "/root/syz-executor.1"[15699] 13:40:05 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x68, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:05 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() open(&(0x7f0000000040)='./file0\x00', 0x0, 0x4) wait4(0x0, 0x0, 0x4000000a, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x1000) sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x0, 0x101182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000206030000000000000000000000000005000400000000000900020073397a30000000000500050002000000050001000600000010000300686173683a69702c6d6163000c00078008001240"], 0x54}}, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000100)={&(0x7f0000001b80)={0x8c, 0x2, 0x7, 0x201, 0x0, 0x0, {0x2, 0x0, 0x6}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x4}, @NFACCT_QUOTA={0xc}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5db}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x9b}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x17}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7}, @NFACCT_FLAGS={0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4044000}, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) 13:40:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:40:05 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80080100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {}]}) ptrace$cont(0x7, r1, 0x0, 0x0) membarrier(0x0, 0x0) 13:40:05 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 553.555926][T15711] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 553.574458][T15712] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:05 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x69, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) 13:40:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:05 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) sendmsg$AUDIT_DEL_RULE(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000500)={0x43c, 0x3f4, 0x200, 0x70bd25, 0x25dfdbfb, {0x2, 0x1, 0xc, [0x200, 0x5, 0x7, 0x9, 0xa7f, 0x7, 0x3f, 0x7, 0x32b0, 0x9, 0x0, 0x6, 0x7, 0x0, 0x0, 0x8000, 0x7f, 0x5, 0x4, 0xad6, 0x101, 0xee77, 0x6, 0x6, 0xfffff001, 0x401, 0x1, 0xb6, 0x5, 0x4, 0x1, 0x7fff, 0x7, 0x6, 0x380, 0xffffffff, 0x48, 0x9, 0x3f, 0x3f, 0x8000, 0x6, 0x1, 0x7fff, 0x10000, 0x9, 0x2, 0x3, 0x8, 0x6, 0x9, 0x1, 0x7fffffff, 0x5, 0x10000, 0x3ff, 0x0, 0x96ef, 0x4, 0xff, 0xe8, 0xea0, 0x9, 0x9], [0x0, 0x40, 0x200, 0x3, 0x77c, 0x9, 0x4, 0x6, 0x9, 0x8, 0x7, 0xc0, 0x24, 0x10001, 0x7fff, 0x10001, 0x100, 0x9, 0x8000, 0x255d, 0x4, 0x93, 0x9, 0x8001, 0x101, 0x4c241ab0, 0x6, 0x9, 0x9, 0x6, 0xc006, 0x6, 0x0, 0x5ab0, 0x4, 0x4, 0x0, 0x1, 0x43, 0x80000001, 0x100, 0x400, 0x4f, 0x9, 0x0, 0x7fffffff, 0x0, 0x9, 0x2, 0x1, 0x0, 0x3, 0x8000, 0x4ac, 0x1, 0x8001, 0x0, 0x10000, 0x3, 0x80000001, 0x4, 0xc9, 0x80, 0x5], [0x9, 0xfffffffa, 0x48, 0x5, 0x8, 0x8, 0xffffffff, 0x1, 0x8, 0xffff, 0x8001, 0xe5, 0x3ff, 0x6, 0x40, 0x5, 0x4, 0x401, 0x2, 0x4523, 0x6, 0xf1, 0x40, 0x190, 0x2, 0x2, 0x3f, 0x7443, 0xc46, 0xffffffff, 0x2, 0x1, 0x9, 0x40, 0x5, 0x9, 0x5, 0x3, 0x1, 0xffffffff, 0x4, 0x694265d8, 0x100, 0x3ff, 0xfffffffd, 0xffff, 0x1, 0x6, 0x80000000, 0x2, 0x0, 0x7, 0x1, 0x4, 0x1, 0xfffffffe, 0x5, 0x0, 0x7436, 0xfff, 0x10000, 0x7fffffff, 0x8, 0x80000000], [0x401, 0x5, 0x3, 0x800, 0x1, 0xffffffff, 0x100, 0xffffffff, 0x100, 0x6ca7, 0x5, 0x40, 0x20, 0xfff, 0x0, 0x6, 0x7f, 0x1f, 0x10001, 0xffff, 0xfffffff7, 0x7, 0x1, 0x3, 0x1, 0x5b, 0x1, 0x101, 0x3ff, 0x0, 0x3, 0x8, 0x16, 0x6, 0x625e, 0xf383, 0x100, 0x5, 0x2, 0x3, 0x2, 0x200, 0x2, 0x401, 0xca1a, 0x4, 0x9, 0x7ff, 0x0, 0x0, 0xcba, 0x101, 0x3, 0xffffffff, 0xce3, 0x3, 0x4, 0x7, 0x0, 0x1, 0x100, 0x1, 0xfff, 0x9], 0x1c, ['&\x00', '\x00', '{@\'$}[^-]&\x00', ':\x00', '$%/&(\'%-}\x00', ']\x00']}, ["", ""]}, 0x43c}, 0x1, 0x0, 0x0, 0x8800}, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) 13:40:05 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x7f) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007e8ff00004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0x178, 0x0, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x80}, 0x48880) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x14, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d8}}, &(0x7f0000000040)='syzkaller\x00', 0x7, 0x7e, &(0x7f0000000200)=""/126, 0x40f00, 0x2, [], 0x0, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x4, 0x7fffffff, 0x4}, 0x10}, 0x78) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000440)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000380)=""/154, 0x9a}], 0x4, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 553.772150][T15724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 553.800835][T15732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:05 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6a, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:05 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000200)=0x8) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e20, @loopback}, {0x2, 0x4e23, @remote}, 0x118, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='batadv_slave_1\x00', 0x4, 0x6, 0xf89}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) 13:40:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 554.000768][T15748] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 554.038002][T15753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) [ 554.093891][T15758] ptrace attach of "/root/syz-executor.5"[15756] was attempted by "/root/syz-executor.5"[15758] 13:40:08 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x1000000000000010, 0x80802, 0x0) write(r1, &(0x7f0000000000)="24000000520001000000f4f9002304000a04f51108000100020000000800028001000000", 0x24) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400002, 0x0) ioctl$TCGETX(r3, 0x5432, &(0x7f0000000200)) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f00000001c0)) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:40:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:08 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:08 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 556.694259][T15776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 556.726843][T15783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 556.745254][T15784] ptrace attach of "/root/syz-executor.5"[15780] was attempted by "/root/syz-executor.5"[15784] 13:40:08 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$peeksig(0x4209, r1, &(0x7f0000000040)={0x9, 0x1, 0x7}, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}]) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f00000001c0)) 13:40:08 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:08 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000040), &(0x7f0000000180)=0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$cont(0x7, r2, 0x3, 0x0) [ 556.918395][T15796] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 556.954152][T15800] ptrace attach of "/root/syz-executor.1"[15795] was attempted by "/root/syz-executor.1"[15800] 13:40:08 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x1, {0x8, 0x9, "0af22c840fada71f6d3b7069be592c4b628a67958f0152e659ebbd8c3a9300194c60cfe74aed7f48c0d05142bde5b095ef0d9693c71f04a95a2e70b974548b5e5565f9939fc226b6f64a00575c9c0f6564d116776e319a4c6ad3dbd02e5efa27a00e6c9f8b479f2037461dcfdda13d8c55b6254a553e068182ac1e4cebb0cec996bec90794e613220af4bdf7c29cfa1b24436cd98485c6c68b8755ed9d1c6b3cec9d37f335d4fffb4a1a4a5f9ad0bde796a4f31d994fe01cf373cba98c48de4d6f3ec8f5ca9f73ddae7b7c5550be8a653847de44b7cbfe404fdcc9819840de622d9ca28531ffc3d506409e1613523044c62f0f37ec704e39531f97c5ed01f2f4", 0x4, 0x6, 0x5, 0xff, 0x81, 0x4, 0x4, 0x1}, r2}}, 0x128) 13:40:08 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:08 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 556.974060][T15802] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:08 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, &(0x7f0000000180)) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {0x7f}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 557.129183][T15814] ptrace attach of "/root/syz-executor.1"[15810] was attempted by "/root/syz-executor.1"[15814] 13:40:11 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:11 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:11 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:11 executing program 1: r0 = gettid() ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000300)='@', 0x1, 0xffffffffffffffff) r2 = add_key(&(0x7f0000000340)='cifs.idmap\x00', 0x0, &(0x7f00000002c0), 0x0, 0x0) keyctl$link(0x8, r1, r2) keyctl$get_persistent(0x16, 0x0, r2) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(r4, 0x8, &(0x7f0000000080)=0x3fb1000000) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000240)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000180)=""/170, 0xaa}], 0x4, 0x0, 0x0, 0x0) tkill(r3, 0x3f) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 13:40:11 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(0x0, 0x40) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ptrace$setopts(0x4206, r2, 0x1, 0x13) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) sched_setattr(r2, &(0x7f0000000040)={0x38, 0x3, 0x8, 0x0, 0x0, 0x0, 0x10001, 0x100000001, 0x1ff, 0x1}, 0x0) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 559.777742][T15839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:11 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:11 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self\x00', 0x501000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:11 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2400, 0x0) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000180)={0x2, 0x4}) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 559.834284][T15846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:11 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:11 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setregs(0xf, r2, 0x40, &(0x7f0000000180)="d5f7db66fa083c618563a221e3d3da7fe11bb170b2fd4de82e9a64883f80618b7d6dfd72008d692bacd31b673720539b3e1537afa9c5695b9d6353ba12e974593dad965ddaef8429ae6bb1defa833b7ba9ef99a838da5f27c4e0fd6da0170c783ed7606fde6d47dd03b4d4ff1b403bce6b82a340fb371971e8b3cfce090f711eb49cadd0bae012d0bb7c1c46b3894de43f5002ac6311e069610ca67114572b36c0f4fcd4da52de1dc0928816f056fb1d381449bc4213dab72ced167f4ea110e5eacd49f1ae3d9e1349cc4b100d2ca2f8f7c4a34881f4feca2f33eb586d6c615fca40f88a00") process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 560.038251][T15863] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 560.067667][T15867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:14 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:14 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:14 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)=0x7) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:14 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6f, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:14 executing program 0: dup(0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 562.835180][T15883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 562.868460][T15887] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:14 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x8, 0x100007) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 562.894950][T15890] ptrace attach of "/root/syz-executor.5"[15886] was attempted by "/root/syz-executor.5"[15890] 13:40:14 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:14 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x70, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:14 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:14 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xb000401}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x19, {0x5, 0x9, 0x2, 0x183cfd52}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4080) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000500)={0x8, [{0x0}], 0x93, "32637fea36d40c"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=r3, @ANYBLOB="3f000000000000000010000000000000010000000000e82e9b5b000000000000ad4d00000000000000000000000000015c910000090000000000000001008d180a5c8c021072157af4000008000000000000000000efe807000000ff0700000000000007000000010400001800"/128]) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)=0x0) ptrace$cont(0x9, r4, 0x0, 0x0) 13:40:14 executing program 0: dup(0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 563.056896][T15903] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 563.088051][T15913] ptrace attach of "/root/syz-executor.1"[15907] was attempted by "/root/syz-executor.1"[15913] [ 563.092836][T15912] ptrace attach of "/root/syz-executor.5"[15906] was attempted by "/root/syz-executor.5"[15912] [ 563.106722][T15914] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:17 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:17 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:40:17 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x23}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:17 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x71, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:17 executing program 0: dup(0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:17 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0xa000, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000001c0)=0x1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_DRAIN(r3, 0x4144, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:40:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 565.950756][T15936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 565.971597][T15941] ptrace attach of "/root/syz-executor.1"[15938] was attempted by "/root/syz-executor.1"[15941] 13:40:17 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 566.024415][T15946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:17 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:17 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = getpgrp(r1) setpriority(0x1, r2, 0xffffffffffffffff) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0xd9, 0x2180) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xac, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@WGDEVICE_A_PEERS={0x6c, 0x8, 0x0, 0x1, [{0x68, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @loopback}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x1000, @mcast2, 0x9}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffffffc}}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}, @WGDEVICE_A_IFINDEX={0x8}]}, 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x4c0c4) [ 566.103461][T15954] ptrace attach of "/root/syz-executor.5"[15951] was attempted by "/root/syz-executor.5"[15954] 13:40:17 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x72, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:17 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x6440c000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000300)=0x1008) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000240)=[{0xfb, 0xff, 0x1, 0x8, @tick=0x9, {0x1f, 0x9}, {0x3f, 0x6}, @quote={{0x7, 0x7f}, 0x0, &(0x7f0000000040)={0x3f, 0x4, 0x1, 0xeb, @tick=0x2, {0x0, 0x9}, {0x5, 0x3}, @time=@tick=0x2}}}, {0x1, 0x6, 0xfa, 0xcc, @tick=0x1, {0xc0, 0x5}, {0x9, 0xfd}, @time=@time={0x6, 0x73b1}}, {0x5, 0x4a, 0x1, 0x80, @tick=0x7fff, {0x7f, 0x6}, {0x5, 0x9}, @ext={0xfb, &(0x7f0000000140)="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"}}], 0x54) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/timer\x00', 0x0, 0x0) ioctl$CHAR_RAW_ALIGNOFF(r2, 0x127a, &(0x7f00000002c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:18 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 566.258124][T15967] ptrace attach of "/root/syz-executor.1"[15963] was attempted by "/root/syz-executor.1"[15967] [ 566.269195][T15970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:18 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x2) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000340)={0xfffffffb, 0x3, {r1}, {0xee01}, 0x0, 0x2}) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000000000a00200000420000000000000000000000000000000000000000000000000000080012000000020000000000000000000600000000000000000000000000000000ac14140000000000000000000000000005000500008000000a00000000000000fc0100000000000000000000000000000000000000000000157e6044955b96b43595def3d9e05a409f705b5634f1b71474c93b8f57b29c545ac403d1d762395d47f71cfb2c2e55d59f79784fe6498af3c61b0018dedd4dfc487ec5f6a0b29c5a1943b5fde53040d3e796f329761afe08a72a8ff300"/252], 0xa0}}, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r2, 0xc038943b, &(0x7f0000000040)={0x80000000, 0x8, [], 0x0, &(0x7f0000000000)=[0x0]}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 566.323875][T15975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 566.340893][T15971] IPVS: ftp: loaded support on port[0] = 21 13:40:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:18 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x73, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:18 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 566.506109][T15989] ptrace attach of "/root/syz-executor.1"[15983] was attempted by "/root/syz-executor.1"[15989] 13:40:18 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe2, &(0x7f0000000180)="5cf249b974057c79b1c2d40011de83cba6a3481d5cb246afa55b5aa526e407cdb41845a77e83973e869bbd0dc69f8a9fa8be19bb6c30e7733fcbc00b3ba8f9123dfc1fb89a648a5862b1ac4148169708fa9001d5749372425dc20b05c309208e900e56d6028968387bb68e0a76a311076574965fee8b364185fb66d61b22daaee897cb760bf134094202a1f49738bd4637cab8fac37f2c7a81ab3cf0001d4695923665f1b38c4c9ec29df995a18158b108116160628c9f7a6962c7c3b3baeff7ea89d14f0917f7352c19f136333650916aa280d71c478a40bf42c41ae83ab30cc258"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x181000, 0x0) read$char_raw(r2, &(0x7f0000006380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bd00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7ffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d865f862a048d8eb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d099dac820564e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008bfc7891f2d4a80d42ac29b2fdf6a4241f2eaa178adee6248fc2b563eb2e110ea3a2d95fa51460ea02ee758c3e5f0ae75cd04e96bdd1ef33683cf7520ef8d1594042604d20885936e4ab40efe88f61ae551ca659e44a87b447375097ecf3db16bd91db1dbfcbeadd0170e2b831bb5fcec5bda44fe1a762c56fd0f8dbdf9fa8240d8e8eb8623ef4c9b2ad0d3eadb613eba1b02d561440b4f10f92e8d0916ad51f9f6608ad6a6c268bd0a3a1e6435a37524beb9c4282503516035d72175a8dd8f6f36a9bd2681d37eaa54e71f5b53daa2065174767f169313b58e3a50e458e23d2edfef8378de58d343bd257eaf47368313c93c7ba2d67e73163417cf9bb458730d079437954765183276036dbe2c516f34de32567288b71de4fc09dfe5913d81f2bc46aa56abee3ceb634e29a3291c58450f5c7122e1132c40619a98ce533155cb117ff38a8ed8c4d24f2"], 0x5c00) [ 566.548941][T15999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:18 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 566.619353][T16007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 566.721793][T16018] ptrace attach of "/root/syz-executor.1"[16015] was attempted by "/root/syz-executor.1"[16018] 13:40:20 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:20 executing program 0: dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:20 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x74, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:20 executing program 1: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x6) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x4, 0x900, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000200), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x9, 0x30, 0x3, 'bridge_slave_0\x00', 'veth0_to_hsr\x00', 'bridge_slave_1\x00', 'ip6gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0x0, 0xff], 0x106, 0x1ae, 0x1e6, [@arp={{'arp\x00', 0x0, 0x38}, {{0x306, 0x6001, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}, 0xffffffff, @remote, [0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x4, 0x40}}}, @realm={{'realm\x00', 0x0, 0x10}, {{0x7, 0x4, 0x1}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @common=@nflog={'nflog\x00', 0x50, {{0x3, 0x40, 0x20, 0x0, 0x0, "0a8a8d363eb79af2def21ef680a4ff12c919d25e89f2a3dba4565ae84e599043095dff316c550e5d8a920649a8c8d4629db047390f9f90b0239b76329dd6584f"}}}], @common=@dnat={'dnat\x00', 0x10, {{@empty, 0x10}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0x2bf72348e43cf356, 0xce8396436923145e, 0xf8, 'nr0\x00', 'sit0\x00', 'bridge_slave_0\x00', 'macvlan1\x00', @multicast, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x19e, 0x1e6, [], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x6, 'system_u:object_r:clock_device_t:s0\x00'}}}], @common=@ERROR={'ERROR\x00', 0x20, {"66daeb99ade3c64102d8719b4cba4a557ce2dfaee978c4a97911bb24b2c2"}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{0x12, 0x1, 0xa00, 'gretap0\x00', 'veth0_to_batadv\x00', 'ip6gretap0\x00', 'veth1_to_bond\x00', @remote, [0xff, 0xff, 0x0, 0x0, 0x0, 0x80], @empty, [0xff, 0x0, 0xff], 0x1f6, 0x26e, 0x39e, [@comment={{'comment\x00', 0x0, 0x100}}, @arp={{'arp\x00', 0x0, 0x38}, {{0x31e, 0x806, 0xa, @remote, 0x0, @local, 0xffffff00, @link_local, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @random="39777e27c813", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0x91, 0x1}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x5dd6, 0x5, 0x710, 0x0, 0x0, "f58dffe7e87069299f4bf5586aec68f5405e2ec97ae38b619dca4f44ee59f9dfceb8fed0763e291364fc68fa0a7ec09d8a48144a27dd2b6fbbd6b503ce1f07c0"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x80000001, 'system_u:object_r:system_dbusd_var_lib_t:s0\x00'}}}}, {0x3, 0x5c, 0x9100, 'veth1_to_hsr\x00', 'netdevsim0\x00', 'ipvlan1\x00', 'bridge_slave_1\x00', @broadcast, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @link_local, [0xff, 0xff, 0x73b5c03e0588c4d, 0xff, 0xff], 0xa6, 0xd6, 0x106, [@realm={{'realm\x00', 0x0, 0x10}, {{0x9, 0x80000000, 0x1}}}], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x8}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}]}, 0x978) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0xfa2f68a) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$getenv(0x4201, r4, 0xffff, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r5, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0x4}, {}, {}, @quote={{0x3}, 0x4, &(0x7f00000002c0)={0x80, 0x2, 0x3c, 0x4, @tick=0x2, {0x1, 0xd2}, {0xea, 0x1}, @addr={0x4, 0xe6}}}}], 0x1c) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) 13:40:20 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:20 executing program 5: r0 = gettid() r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x49) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x1, 0x0, 0x0, 0x0, @time, {}, {0x0, 0x9}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:40:21 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(r1, &(0x7f0000000000)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000000180)=""/183, 0xb7}], 0x4, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000240)=""/209) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 569.192937][T16045] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 569.225729][T16050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:21 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x75, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:21 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000340)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x10000, 0x0) fspick(r2, &(0x7f0000000180)='./file0\x00', 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:21 executing program 0: dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 569.301597][T16061] ptrace attach of "/root/syz-executor.5"[16059] was attempted by "/root/syz-executor.5"[16061] [ 569.371654][T16063] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:21 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r2, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-avx2\x00'}, 0x58) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) vmsplice(r4, &(0x7f0000000100)=[{&(0x7f0000000340)="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", 0x2}], 0x60, 0x8) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 569.414914][T16072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 569.426356][T16075] ptrace attach of "/root/syz-executor.5"[16071] was attempted by "/root/syz-executor.5"[16075] 13:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:24 executing program 0: dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:24 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x76, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:24 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000180)={0x320, 0x0, 0x2, 0x5, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x2, 0x46}}}}, [@NL80211_ATTR_TID_CONFIG={0x4c, 0x11d, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x91}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x7}]}]}, @NL80211_ATTR_TID_CONFIG={0x2ac, 0x11d, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3f}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x8}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x8000}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x40}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x7f1}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}]}, {0x224, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x220, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x94, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x5, 0x1b, 0x24, 0x60, 0x1b, 0x6c, 0xb, 0x55, 0x1b, 0x9, 0x1b, 0x6c, 0x48, 0x12, 0xb, 0xc, 0x18, 0x60, 0x24, 0x1, 0x5, 0x9]}, @NL80211_TXRATE_HT={0x50, 0x2, [{0x6, 0x8}, {0x6, 0x1}, {0x6}, {0x2, 0x9}, {0x0, 0xa}, {0x7, 0x8}, {0x3, 0x5}, {0x1, 0x5}, {0x1, 0xa}, {0x0, 0x4}, {0x1, 0x3}, {0x0, 0x2}, {0x3, 0x2}, {0x6, 0x9}, {0x3, 0x1}, {0x7, 0x3}, {0x5, 0xa}, {0x3, 0x3}, {0x4, 0x2}, {0x7, 0x5}, {0x1}, {0x1}, {0x0, 0x4}, {0x2, 0x8}, {0x7, 0x6}, {0x7, 0xa}, {0x2, 0x7}, {0x1, 0x9}, {0x6, 0x3}, {0x5, 0x2}, {0x1}, {0x6, 0x1}, {0x0, 0xa}, {0x6, 0xa}, {0x1, 0x2}, {0x4, 0x8}, {0x4, 0xa}, {0x1, 0x3}, {0x3, 0x7}, {0x6, 0x4}, {0x4, 0x9}, {0x1, 0x2}, {0x0, 0x1}, {0x3, 0x6}, {0x7, 0x8}, {0x4, 0x4}, {0x1, 0x9}, {0x3, 0x3}, {0x7, 0xa}, {0x0, 0x9}, {0x5, 0x8}, {0x4, 0x6}, {0x1, 0x4}, {0x0, 0x6}, {0x5, 0x8}, {0x2, 0x8}, {0x0, 0x7}, {0x1, 0x2}, {0x0, 0x3}, {0x6, 0x1}, {0x3, 0x9}, {0x6, 0x8}, {0x7, 0x1}, {0x4}, {0x6}, {0x7, 0x1}, {0x3, 0xa}, {0x5, 0x4}, {0x7, 0x8}, {0x0, 0x6}, {0x6, 0x6}, {0x2, 0x4}, {0x1, 0x2}, {0x4, 0x3}, {0x2, 0x8}, {0x1, 0x4}]}, @NL80211_TXRATE_HT={0x22, 0x2, [{0x4, 0x1}, {0x5, 0x2}, {0x4, 0xa}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0xa}, {0x6, 0x5}, {0x0, 0x6}, {0x7}, {0x4, 0x5}, {0x1, 0x5}, {0x7, 0x5}, {0x4, 0x2}, {0x2, 0x1}, {0x4}, {0x1, 0x3}, {0x0, 0x9}, {0x6, 0x5}, {0x6, 0x2}, {0x2, 0x1}, {0x7, 0x4}, {0x4, 0x9}, {0x4, 0x8}, {0x5, 0x6}, {0x6, 0x2}, {0x7, 0x9}, {0x5}, {0x1, 0x3}, {0x0, 0x8}, {0x6, 0x9}]}]}, @NL80211_BAND_6GHZ={0x14, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_6GHZ={0x20, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0x4, 0x48, 0x16, 0x0, 0x1b, 0x12, 0x3, 0xc, 0x36, 0xb, 0x30, 0xc, 0x12, 0x2, 0x24, 0x30, 0x1b, 0x2, 0x24, 0x30, 0x6c]}]}, @NL80211_BAND_2GHZ={0x100, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x48, 0x2, [{0x0, 0xa}, {0x0, 0x7}, {0x2, 0x4}, {0x0, 0x6}, {0x4, 0x5}, {0x5, 0x1}, {0x1, 0xa}, {0x7, 0x1}, {0x2, 0x8}, {0x1, 0x3}, {0x7, 0x4}, {0x6}, {0x0, 0x3}, {0x7, 0x9}, {0x5, 0xa}, {0x2, 0x3}, {0x6, 0x8}, {0x6, 0x6}, {0x0, 0x7}, {0x3, 0x7}, {0x1, 0x4}, {0x0, 0x5}, {0x7, 0x2}, {0x0, 0x9}, {0x7, 0x8}, {0x4, 0x2}, {0x6, 0x4}, {0x6, 0x5}, {0x0, 0x7}, {0x5, 0x5}, {0x3, 0xa}, {0x2, 0x3}, {0x1, 0x1}, {0x2, 0x6}, {0x0, 0xa}, {0x4, 0xa}, {0x1, 0x2}, {0x7, 0xa}, {0x4, 0x1}, {0x1, 0x1}, {0x1, 0x8}, {0x5, 0x7}, {}, {0x6, 0x6}, {0x2, 0x8}, {0x7, 0x5}, {0x3, 0x6}, {0x7, 0x3}, {}, {0x5, 0x9}, {0x1, 0x6}, {0x4, 0x2}, {0x1, 0x9}, {0x6, 0x5}, {0x5, 0x3}, {0x2, 0x2}, {0x7, 0xa}, {0x0, 0x2}, {0x0, 0xa}, {0x1, 0x8}, {0x6, 0x7}, {0x4, 0x7}, {0x4, 0x9}, {0x7, 0x3}, {0x7}, {0x5, 0x4}, {0x1, 0x6}, {0x1, 0x2}]}, @NL80211_TXRATE_LEGACY={0x1f, 0x1, [0x42, 0x9, 0x1b, 0x62, 0x24, 0x30, 0x1b, 0x24, 0x6c, 0x30, 0x18, 0x5, 0x3, 0x60, 0x2, 0x16, 0x32, 0x2, 0xc, 0x24, 0x60, 0x30, 0x0, 0x16, 0x22, 0x19, 0x16]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x5, 0x7fff, 0xff, 0x9f, 0x7, 0x1000, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x8, 0xcc59, 0x6, 0x9, 0x81, 0x200, 0x8]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x2, 0x30, 0x6e, 0x5, 0x56, 0x3, 0x2, 0x2, 0x60, 0x3, 0x48, 0x30, 0x48, 0x3, 0x12, 0x23]}, @NL80211_TXRATE_LEGACY={0x5, 0x1, [0x24]}, @NL80211_TXRATE_LEGACY={0x1b, 0x1, [0x48, 0x3, 0x30, 0xb, 0x24, 0x24, 0x36, 0x24, 0x5, 0x1, 0x6, 0x18, 0x36, 0x24, 0x5, 0x30, 0x1, 0x9, 0x4, 0x9, 0x48, 0x16, 0x48]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x24, 0x24, 0x5, 0x9, 0x12, 0x1, 0x6, 0x60, 0x18, 0x60, 0x4, 0xc, 0x1, 0x60, 0x4, 0x9, 0xb, 0x4, 0x30, 0x6, 0x3, 0x5, 0x30, 0x5, 0x6c, 0x2, 0x2, 0x18, 0x48]}]}, @NL80211_BAND_5GHZ={0x48, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x43, 0x2, [{0x7, 0x6}, {0x7, 0x4}, {0x1, 0x3}, {0x0, 0x8}, {0x3, 0x5}, {0x6, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x7, 0x2}, {0x1, 0x7}, {0x1, 0x8}, {0x2, 0x8}, {0x0, 0x7}, {0x3, 0x4}, {0x0, 0xa}, {0x7, 0x3}, {0x4, 0x2}, {0x7, 0x5}, {0x3, 0x5}, {0x1, 0x5}, {0x0, 0x2}, {0x0, 0x5}, {0x5, 0x4}, {0x2, 0x7}, {0x2, 0x7}, {0x2, 0x3}, {0x7, 0x4}, {0x1}, {0x7}, {0x0, 0x9}, {0x0, 0x2}, {0x4, 0x7}, {0x5, 0x1}, {0x7, 0x1}, {0x2, 0x2}, {0x5, 0x1}, {0x1, 0x7}, {0x4, 0x3}, {0x7}, {0x3, 0x4}, {0x4, 0x4}, {0x7, 0x2}, {0x7, 0x7}, {0x4, 0x2}, {0x0, 0x2}, {0x5, 0x4}, {0x4, 0xa}, {0x0, 0x8}, {0x6, 0x2}, {0x4, 0xa}, {0x3, 0x5}, {0x3, 0x8}, {0x0, 0x6}, {0x4, 0x4}, {0x7, 0x5}, {0x3, 0x6}, {0x6, 0x7}, {0x1, 0x7}, {0x5, 0x6}, {0x5, 0x8}, {0x5, 0x1}, {0x0, 0x3}, {0x2, 0x2}]}]}, @NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x8, 0x1, [0xc, 0x60, 0x48, 0xc]}]}]}]}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x20004050}, 0x48c0) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 13:40:24 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0xfffffffffffffffd, 0x100061) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000180)={0x2c, 0x0, [], [@pad1]}, 0x10) 13:40:24 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r0, 0xffff, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 572.301166][T16097] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:24 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:24 executing program 5: r0 = gettid() r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$AUDIT_TRIM(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3f6, 0x200, 0x70bd2b, 0x25dfdbff, "", [""]}, 0x10}}, 0x44880) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 572.373373][T16104] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:24 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x77, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:24 executing program 1: r0 = gettid() gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x400, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) r3 = getpgrp(r0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000040)=r3) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x40, 0x0, 0x0, @time, {0x2}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 572.448882][T16112] ptrace attach of "/root/syz-executor.1"[16110] was attempted by "/root/syz-executor.1"[16112] 13:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 572.544334][T16125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:24 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 572.584458][T16131] ptrace attach of "/root/syz-executor.5"[16128] was attempted by "/root/syz-executor.5"[16131] [ 572.615152][T16136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:24 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x78, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:24 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:24 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 572.842799][T16152] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 572.872921][T16159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:27 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4400, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000200)={0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0xa00966, 0x4, [], @p_u8=&(0x7f0000000180)=0x6}}) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000540)={0x6}, 0x2) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0800328b", @ANYRES16=r3, @ANYBLOB="020008000600008000000800040003000000f9ff06dd3f000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x48810) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0xb4480, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000480)={0x4, &(0x7f00000003c0)="865d794a925a3a09e9c5c0f188d5028517a714c3854f1baa7ee24fc76f4a7da935e87c680e75cb824d46c5128ec7b6b66b0d8ed75ecb8ce83cdf9e81a310cc1542196508ba75fb3666b6873ec04f3961d30e1e9494d1025030ba26d19472f848ecefee9ed58a19fa38ee957e86739829b32361011488e381945ecc7d0581abe9082bd2eb88da495e3bf4d5e7fec20310f4f3fbe196e1859ed131176e64"}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000500)=0x5, 0x4) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:27 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:27 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_procfs(r0, &(0x7f0000000040)='net/ip_vs_stats\x00') readlinkat(r2, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/101, 0x65) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:27 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x79, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:27 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x40, 0x20000000000000) [ 575.624616][T16180] ptrace attach of "/root/syz-executor.5"[16176] was attempted by "/root/syz-executor.5"[16180] [ 575.641215][T16179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 575.703539][T16185] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:27 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4200, r1, 0x0, 0x2) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0xb0, 0x9, 0x5, 0x3e, @time={0x1, 0x9}, {0x7f, 0xd7}, {0x30, 0x5}, @ext={0x5c, &(0x7f0000000240)="aa9fc87db73d94009b06d11b8739f1b1a0e44943ca8ec48919707201fff6c7266e1723965ea69ad2c367b5880231dafff0cbc146ea92b149efcf2e6ec4b8443c990cfaaf13f05c74acc2981a2cd4d1f9eeb3a99925c0a749d7050df5"}}, {0x58, 0x1, 0x6, 0x2, @time={0x80000000, 0x80}, {0x0, 0x2f}, {0x65, 0x7}, @note={0x0, 0x2, 0x8, 0x5, 0x8}}], 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="4453969588abc48307408f9f38dbbec0a5477d03db9116c01f4ec33411446b690c3eac39fd682f85c2314531a7473e5d62a3e54ddb7caa07ec4e080543591318dc", 0x41, 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r2, 0x6) ptrace$cont(0x7, r1, 0x0, 0x0) [ 575.746014][T16194] ptrace attach of "/root/syz-executor.5"[16192] was attempted by "/root/syz-executor.5"[16194] 13:40:27 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x7a, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:27 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0xc8200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xc4, r2, 0x400, 0x70bd27, 0x9, {}, [@TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa37}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4000880}, 0x20000800) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:27 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 575.865987][T16205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 575.916536][T16206] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 576.017407][T16210] IPVS: ftp: loaded support on port[0] = 21 13:40:30 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x7b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:30 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f0000000040)=0x7ff) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000180)={0x0, 0x0, {0x6, 0xfff, 0x6, 0xffffffdc}}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 13:40:30 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @note={0x1, 0x5, 0x2, 0x2, 0x6}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/206, &(0x7f0000000040)=0xce) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 578.721182][T16250] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:30 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 578.776289][T16258] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 578.783698][T16260] ptrace attach of "/root/syz-executor.5"[16254] was attempted by "/root/syz-executor.5"[16260] [ 578.796370][T16261] ptrace attach of "/root/syz-executor.1"[16256] was attempted by "/root/syz-executor.1"[16261] 13:40:30 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x29, 0xff, 0x2, 0x800, 0x4, @empty, @mcast1, 0x7800, 0x1a18d4af26c91a34, 0x200, 0x10001}}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000180)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x7c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:30 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000001}, 0x20) [ 579.018777][T16271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 579.050682][T16276] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 579.061484][T16277] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 13:40:33 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:33 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:33 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x7d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:33 executing program 1: r0 = gettid() r1 = fcntl$getown(0xffffffffffffffff, 0x9) clone3(&(0x7f0000000300)={0x9000, &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0), {0x3b}, &(0x7f0000000200)=""/66, 0x42, &(0x7f0000000280)=""/31, &(0x7f00000002c0)=[r0, r1, r1, r0], 0x4}, 0x58) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) fdatasync(0xffffffffffffffff) ptrace$cont(0x7, r3, 0x0, 0x0) [ 581.624427][T16300] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 581.645386][T16303] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:33 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x7e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:33 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() getpgid(r0) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0xfffffffd) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) pkey_alloc(0x0, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:33 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:33 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x60}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 581.783269][T16310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 581.822632][T16312] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:33 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x37, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$9p(r3, &(0x7f0000000180)="b61e039e8c589977669afbfab3501c76a249b5ed3b1ef43c05bcad5726df01377f78655b06e3d67183c866efd338c639575db530efa6abc8f34c807e45893db19ebd9e24d794cd96601b3408617a6e9839a72ebf", 0x54) ptrace$setregs(0xf, r1, 0x6, &(0x7f0000000300)="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") ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:36 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:36 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000180)={&(0x7f0000000040)=[0x7, 0x3f, 0x6, 0x80, 0xffffff00], 0x5, 0xc0000, 0x0, 0xffffffffffffffff}) write$uinput_user_dev(r2, &(0x7f0000000500)={'syz1\x00', {0x3, 0x40, 0x7, 0x5}, 0x39, [0xff, 0x4, 0x6, 0x1, 0x7f, 0x400, 0x80000000, 0x7fffffff, 0x8, 0xddf, 0x200, 0x1, 0x7, 0x100, 0x7, 0x4, 0x8, 0x43d, 0x3, 0x9, 0x3, 0x80000001, 0xfffffffe, 0x2, 0x0, 0x319a, 0x0, 0xe8, 0x6, 0x6, 0x1fe0000, 0x0, 0xffff, 0x1, 0x2, 0x1f, 0x8, 0x5, 0x5, 0x1f, 0x1, 0x70, 0x4, 0x5, 0x7fffffff, 0x2, 0x1ae6, 0x3, 0x80000000, 0xf24a, 0x80000001, 0x21, 0x3, 0x3, 0x0, 0x6, 0x8, 0x94f, 0x3, 0x1ff, 0x1, 0x2, 0x5, 0x3f], [0x1000, 0x4, 0x41, 0xf5, 0xaf, 0x9, 0x3, 0x7, 0x7fff, 0x3, 0x7, 0x1, 0xfffffff9, 0x3ee, 0x296c, 0x9474, 0x3, 0x0, 0x3, 0xd5cc, 0x72, 0x1, 0x800, 0x9, 0x80000000, 0x9, 0x5, 0x4, 0xb1, 0xfffffffd, 0x1ff, 0x477, 0x7ff, 0x5, 0x3, 0x7, 0x7ff, 0x8001, 0xf6b, 0x2, 0x100, 0x18c6, 0x10001, 0xff, 0x6, 0x58, 0x98, 0x7, 0x9, 0xe95, 0x8000, 0x401, 0x0, 0x81, 0x7f, 0x7fffffff, 0x1f, 0x38b, 0x7940, 0x8, 0xffff, 0xfff, 0x10001, 0xfffffff7], [0x9, 0x200, 0x0, 0x8, 0x7add, 0xff, 0x800, 0x3, 0x6, 0x5, 0x7, 0x7, 0x5, 0x3, 0x7f, 0x3, 0x4, 0xf, 0x0, 0x7, 0xffffffc1, 0x5, 0x8, 0x8, 0x7, 0x3, 0x5, 0x101, 0x8000, 0x4, 0xffffffff, 0x4, 0x3ff, 0x3ff, 0x51, 0xfffffffa, 0x80000000, 0x5d3, 0x7fffffff, 0x7fffffff, 0x6, 0x5, 0x1, 0x3, 0x20, 0x5fb, 0x0, 0x0, 0x4, 0x2, 0x4, 0x7fff, 0x6, 0x3, 0x5, 0x40, 0x8, 0xffff, 0xec6, 0xffff, 0x1, 0x2, 0x717, 0x8000], [0x1, 0x5, 0xd4, 0x4, 0x2, 0x7, 0x4, 0x0, 0x1f, 0x8, 0x10000, 0x37d4, 0x8, 0xfffffffd, 0x1, 0x3, 0x4b, 0x2, 0x2, 0x1, 0x4, 0x1000, 0x84d, 0x800, 0x5, 0x7, 0x81, 0x7, 0x9, 0x4, 0x5, 0x6, 0x8, 0x10000, 0x10000, 0x4, 0xffffffff, 0x3, 0x4, 0xfff, 0x7fffffff, 0x0, 0x40000, 0x6, 0x1, 0x5, 0x29f000, 0x10001, 0x400, 0x8000, 0xc6b, 0x7d7dbed7, 0x3, 0x40, 0x1000, 0x7, 0x100, 0x5, 0x10000, 0x8, 0x3, 0x3, 0xfffffff8, 0x8]}, 0x45c) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:36 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x82, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x60}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:36 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) rt_sigpending(&(0x7f0000000200), 0x8) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @result={0x80000001, 0xfffffffe}}], 0x98) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f0000000180)={{0x1, @private=0xa010101, 0x4e22, 0x3, 'none\x00', 0x20, 0x7, 0x36}, {@multicast1, 0x4e21, 0x4, 0x8, 0x0, 0x1ff}}, 0x44) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f0000000040)={0x1f, 0x3, 0x20, 0x6, 0x0, 0x7, 0x5, 0xc2, 0x8, 0x81, 0xff, 0x3f, 0x18}, 0xe) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 584.744942][T16348] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 584.751405][T16349] IPVS: set_ctl: invalid protocol: 1 10.1.1.1:20002 [ 584.784725][T16353] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 584.794439][T16352] ptrace attach of "/root/syz-executor.1"[16350] was attempted by "/root/syz-executor.1"[16352] 13:40:36 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x83, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x60}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:36 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0xffffffffffffffff, 0x0, 0x1000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000200)="3fb09acb3d83401ffbe6d58a779e9338d2b7ab07d191a98f560587839f0300000000000000a0f5c733131a10c17db022ee3672327cedd7fdfd65f7202c892b85c5b4476b411de5ce6f46d1a7174c263b73276af617f3b5a25c7e0df6fecb2d5d3445765ffd9253b86f3fdfd56e0c9392") ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:36 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 584.916293][T16366] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 584.942781][T16367] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:39 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:39 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) get_robust_list(r0, &(0x7f00000002c0)=&(0x7f0000000280)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x0, &(0x7f0000000240)={&(0x7f0000000200)}}, &(0x7f0000000300)=0x18) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=0x1024) 13:40:39 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x84, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:39 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:39 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$kcm(0x29, 0x5, 0x0) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x88040, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000180)={'macvlan0\x00'}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 587.824370][T16395] ptrace attach of "/root/syz-executor.1"[16392] was attempted by "/root/syz-executor.1"[16395] 13:40:39 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) sched_getattr(r1, &(0x7f0000000040)={0x38}, 0x38, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:39 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 587.868443][T16399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:39 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) semctl$IPC_RMID(0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 587.962093][T16406] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:39 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x78}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 588.044216][T16416] ptrace attach of "/root/syz-executor.1"[16413] was attempted by "/root/syz-executor.1"[16416] 13:40:39 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x85, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 588.392131][T16432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 588.418337][T16433] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:42 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:42 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000180)={'ip_vti0\x00', {0x2, 0x0, @local}}) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x7, &(0x7f0000000040)="7535ec8b0a76e9484e") vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x78}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:42 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x86, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 590.936465][T16447] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:42 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x78}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:42 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x30, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x6, 0x2d}}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4080}, 0x40000) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) [ 590.981828][T16451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:42 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x87, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:42 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x408800, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000380)) write$P9_RCREATE(r2, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x8, 0x4, 0x1}}}, 0x18) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000002c0)=[{0xfd, 0x7, 0x5, 0x7f, @tick=0x9f, {0x9, 0x9f}, {0x3f, 0x20}, @raw8={"90f1f829eae2ac8f1dad7517"}}, {0x1, 0x40, 0xff, 0x2, @tick=0x5, {0x75, 0x20}, {0x3}, @result={0x80, 0x4}}, {0xec, 0x0, 0xed, 0xff, @time={0x1000, 0x4}, {0x1f, 0x3}, {0x20, 0xe1}, @ext={0x6f, &(0x7f0000000140)="a66e8b755fcfe8aca55af17963618b6858f6339131b57cf49459240c85eefbf3a9f922ccd8504404e9e67857335a5f5f1d7e59d08f5a475cfaaeda76ad182b5272b9cc86ac9910abdb0786c8529054b6fd1e4b5e7bac614f832134d0e694aadd28422c5fe204fbc262009bb579394b"}}, {0x90, 0x40, 0x1, 0x1, @tick=0x3, {0xfb}, {}, @raw32={[0x7, 0x3, 0x1f]}}, {0x4, 0xd0, 0x59, 0x0, @time={0x9}, {0x1f, 0x2}, {0x0, 0x2}, @ext={0xe7, &(0x7f00000001c0)="5e623c2b627fcff8ab8779920473cbdb270c3084b7006810780474acc297e977ccb248e92ab2fe3f3921a5b42f9722f8b47c0ff8d28695dcc493a1d3f10de47782f41cdd13794647633b7359fadb5d9bd054219324642d16360ac9282479417b48bfdb9a2e4e123dc1213d32526f6dd97b42ce5c3c791707ca25af48d1971b47554056e2591777ef5781b6196f9d8ecf6ea3af24540bc791cda8a9e64209896bfdf4e2a14354a25dadd63d58f128c81924a7373840139fa711a47e50d27dddb481b9f556e9888ef20414f26caf9676bb09ef073ad4731940a3f7accdcbb912745602a78bc90c38"}}, {0x1, 0xff, 0xeb, 0x9, @tick=0x8, {0x56, 0x89}, {0x81, 0x80}, @connect={{0x0, 0x4f}, {0x40, 0xff}}}], 0xa8) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 591.142987][T16463] ptrace attach of "/root/syz-executor.1"[16459] was attempted by "/root/syz-executor.1"[16463] [ 591.154123][T16464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 591.251363][T16471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:45 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:45 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) tkill(r2, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:45 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x100, 0x0) fremovexattr(r2, &(0x7f0000000180)=@known='trusted.overlay.impure\x00') write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0x0, 0xb0}, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:45 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:45 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x88, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:45 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 594.013679][T16493] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 594.039542][T16498] ptrace attach of "/root/syz-executor.5"[16492] was attempted by "/root/syz-executor.5"[16498] 13:40:45 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 594.068696][T16503] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:45 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000180)={{0x5, 0x2, 0x8bb, 0x5, '\x00', 0x9}, 0x1, 0x20, 0x3f, r0, 0x7, 0x8169, 'syz0\x00', &(0x7f0000000040)=['\x00', '$^!\x00', '):\x18^#\x00', '\x00', '){+:-[-):\x00', '\x00', '\xc5/)-/\\@:\'O\x00'], 0x22, [], [0x7ff, 0x72c, 0x7, 0xd96]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_BITS(r3, 0x80045005, &(0x7f00000002c0)) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:45 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$TIOCNOTTY(r2, 0x5422) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe00, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c000000100001080000000000000000000000005001b2c649271ba2181a43cd1cf85bf6427512ac2a7b2547ef24aaa325424212dee8e857c1724716dac4ed5ccfb5c20f2b9182664990c68ab92f1ed9efc88baddecea091c12745626d29079d36a69ffc763b159185860ff402a743eea1923f996ba57e286fceefa07730dbe9641d1a081785fa47231afbf7a237d6c9326d135244f55a39696d649e9b9012b8b14a4ec94ae65c8042d8508c599f2bf7f623962e96ff643e5eda3cc07e", @ANYRES32=0x0, @ANYBLOB="000000000000000044001a80080002800400018038000280340001800800190000000000080016000000000008001a000000000041fd0000000000000800000000000000080008000000000008001b0000000000"], 0x6c}}, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000180)={'batadv_slave_0\x00', @ifru_names}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:45 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x89, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:46 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 594.274344][T16522] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 594.304520][T16526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 594.345658][T16527] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. 13:40:48 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:48 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:48 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x8a, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:48 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000180)=0x1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0xfc, 0x0, 0x0, 0x0, @tick=0x101, {0x2}, {}, @ext={0x20, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:48 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x8b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 597.098447][T16545] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 597.111166][T16548] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 597.111893][T16547] ptrace attach of "/root/syz-executor.5"[16543] was attempted by "/root/syz-executor.5"[16547] 13:40:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:40:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:49 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) sysfs$1(0x1, &(0x7f0000000040)='.b\x11\\%^!\x00') vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, 0x0, 0x0) 13:40:49 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)={0xb, {'syz1\x00', 'syz1\x00', 'syz0\x00', 0x7e, 0x8a, 0x12, 0x0, 0x1000, 0x4, "629189a81eda51afe0725f5882b9753f7f1bae3f926d9ec2a47ac68271238b84c44a016e72c9a83528a83ecb5e90560bf1f2d1d17e2a1db9a92bdb614757fc2b937b0e5c6e69200622166e5e44f0fec93daf76d06bd9114458f5a724b12eb97789d0012c5a35bd0abbbf65d08232cd675e2cb60f413d6867357c4ceab8bd"}}, 0x196) ptrace$cont(0x7, r1, 0x0, 0x0) [ 597.271569][T16556] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 597.324928][T16560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 597.362658][T16572] ptrace attach of "/root/syz-executor.1"[16563] was attempted by "/root/syz-executor.1"[16572] 13:40:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) [ 597.371503][T16571] ptrace attach of "/root/syz-executor.5"[16566] was attempted by "/root/syz-executor.5"[16571] 13:40:51 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:51 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) vmsplice(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="0f3496360e646e4b59ede939b05ce004c0bdc5dec336e063947f19d2e0717ca62e208834c4208eff806b588d07b3eacb786bda90819aca7d4b27cd128a238810f666b8838d92b54616d884ccaa6ee6da8994d278ed1180da7782616b3c1a1c3c412b54cb87ea19cf77cf683ae2bd9d7739fc66bea1c28a9de9cf98fd7738762101502c2a7029f49bc29a6f687ae15b240e783c65d5fb3c6523a17665c8b4", 0x9e}], 0x1, 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:51 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x8c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:51 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:51 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, 0x0, 0x0) 13:40:51 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) pipe2(&(0x7f0000001d00)={0xffffffffffffffff}, 0x800) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/ubi_ctrl\x00', 0x400000, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001e00)=[{&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000200)="e927101233ad3759f696d4c18b72bf4a001b14707dba436ec302e620ffa1b9904e65061aa5dbe5f6cd3fdebdb816ff7ce8fad636678675b03c9e7eef08ff7bede42bf6a592dc82041adbab59112f8222e16bfa0743eaefc050dd88e373fd3a80f5b5e7b7dadf65b5e5d3383c2c5334065853e7f395d6780f49cf9f45347c089bea466c1c86fdbc2cf09b489182062e473a119ed287c520e4659d341f2275a3205e9e6b862e1002b2047c559f08bf9e9307da35ed12925ab173dd4e1cbf6d747051a0ba1ecca736770e3b459decf8", 0xce}, {&(0x7f0000000040)="3fc43e8b1b582e099d6c39846cdf3b7f33dbb2012ffcc7", 0x17}, {&(0x7f0000000300)="b3749806359461ea69d1dcd96fd507199f3f9e168d753cdc433d6bcde34ee6b2f2ccff5aa468024da2896dfb33118ad5b70aecb2716590efc6f4b6b686fd5ffe4aa1ea191e446936aa6bba3619c1f9c798025f49c937b802ebd60f9d0399ddab1d5d49c354f2dfa6be83977f19b7e51a07de66d9f14f42d9430f37835409c50d11c64dcf5a1762fab8e45c4265aae58b46295875656fbdef61bdc9b63e2e0b95828344928bf1a29f5be8bd8702f757d9c891e8078650b70e8a8817345d2f61015bb3273e46a647a4706fd5c1ee96d2f262171987926545509732885498d9e0b1b5585140425eec2d294af8", 0xeb}, {&(0x7f0000000400)="c9521e013c8b0c5c7ef061de4358e3f1ac0f6309be54ab9bbf6a0473becbf8a0095162211b6f8ff38062ad06ef0778c8a652a06c52ea466b891b6ec9561f2a1880b60f83c8a2ea72755d0753", 0x4c}], 0x4, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee01}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, {&(0x7f0000000640)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001840)=[{&(0x7f00000006c0)="529e1aee340a7da28164950d2b964ff281f6866b8de59194a59df46315a43e232aeaff7c46218d02950f8e4807c522df644e0f19e2e79adfb3c3874b7cea669bfcd3ecc0c79add304e172d1d6c26c4c365fbec6b713ae78d4a8f30820d08045cbf60188d6acaa5917098269249deae10c449814b0aa09487cca396a4389b7d396de084031f17e40226b724abd6db0b132179", 0x92}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="c75458d191a7bd68bc25a6d5be37f7897dc2619f4092eb1ef8fc972f367e4fdc7fc9273b8d3041de3d3967c43a0cc72ec695ce7a3f13c457196fd81af81ee2e8fc26ff7013cbc7738278e952786fbb1403b561864f8c9913686828e9b4f4e490837fb51750eda9324f2e0593fbe573e137b930908c0b58306ce00e9aad413c58e4b02d05fd8a7205d24b47921872a7eb0166bc6fa7f9c9bb6b93df065f785f2ba550424a7e", 0xa5}], 0x3, 0x0, 0x0, 0x8890}, {&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001900)="b12340bbf1909d35f687b0732d3404b6739fd3be8601b609c52b77da003eec84543b1ef11e202edee80eda0a399b8aafc7bec4fa9f468bcf36f65678410e10f22688f97c4b27ee8b5603f012c98107e9f0f2cbb3d829de93a9323783969c8a609e0e21e90e7617e2f5f10155468cf39b8e9c9f653006df8c99a4fdf9ff0e1d89643013f2a7e1c4b24e", 0x89}, {&(0x7f00000019c0)="fb8f422bb141c938344955603d4448448bb3b90a02665cec621f8b5dab219b2cd3a23c4da0767359e7bc2cfaf9f325a668044cdab2f7290a5af5f5a692f1350519542f75d20ee87f4fa5ad6b2193f6859399a027fb4068d1193558d3eda2f3e6feb181c896bdb214af163a1b8d842f0d70bb3344bd0fcc6e30092a1ddc84e954ddaef4609c34651c27f36aa5503d068a75424d7659e9a9bb4f64a0bc5a572dfc274f22c40667f9cbaa70f624d4d1ed0f861ed69acea8be15c0a75e6cde41", 0xbe}], 0x2, &(0x7f0000001ac0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0xffffffffffffffff}}}], 0x40, 0x20000000}, {&(0x7f0000001b00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001b80)="aac9c49b055f08bbe8471c9eabf1d9dd9081cd4c059592f01905532be0dbec38b457b4bc29aa0de7b9ac41c56aba282e125dc804284b794714751a22bf556093aa89d9d40f292c212d209a3d49a546ddb52bfdc6251ec813ccad990b889900d28f6c2558aa4f674aa6c561cfeb0960f4466e596d6b0876a35cedfbddc2e2dcd8690c69f9c8fbf088c3c2de1e345e54a79c25cdc235edf00c1fddce", 0x9b}, {&(0x7f0000001c40)="98e965807f4b8156927bbdcff23f52c70199f101d16c2066f7ceda74772b01c7bf6c8ea0023bcaf5fd2e87a708a49e0f632d6632cb04b5c10ea8513a078f6f5b97c8066b359dbbe44844e9a2f3ef83b77a3b567fce56e2ed6c3cac26b5c8ed824712a8b4a7e4904f2a5b540ccfe271a07d4b2c36e9fe661ab1ba23b97bb5b0", 0x7f}], 0x2, &(0x7f0000001d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x80, 0x8000}], 0x4, 0x40040040) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) [ 600.191947][T16595] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:52 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005be6753c9fad7cab0c1c1ebb2000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@loopback, @mcast1, @private0, 0x1, 0x400, 0x101, 0x100, 0x1800, 0x0, r4}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 600.234159][T16600] ptrace attach of "/root/syz-executor.5"[16596] was attempted by "/root/syz-executor.5"[16600] [ 600.245182][T16601] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:52 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000040)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:52 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, 0x0, 0x0) 13:40:52 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x8d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 600.360285][T16608] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 13:40:52 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) socket$key(0xf, 0x3, 0x2) [ 600.451568][T16623] ptrace attach of "/root/syz-executor.1"[16608] was attempted by "/root/syz-executor.1"[16623] [ 600.463345][T16625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 600.485919][T16627] ptrace attach of "/root/syz-executor.5"[16614] was attempted by "/root/syz-executor.5"[16627] [ 600.501573][T16630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 600.541206][T16608] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 13:40:55 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) 13:40:55 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:55 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:55 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x8e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:55 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x6, r1, 0x5, 0x100001) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040881}, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5ebe58cab6647d612ac6"}}], 0x6d) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 603.316736][T16655] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) 13:40:55 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 603.383758][T16660] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 603.393329][T16661] ptrace attach of "/root/syz-executor.5"[16658] was attempted by "/root/syz-executor.5"[16661] 13:40:55 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000240)={0x4, &(0x7f0000000040)=[{0x1, 0x20, 0x80, 0x7}, {0xb50, 0x4, 0x7f, 0x9}, {0x0, 0x0, 0x2, 0xfffffffd}, {0xf801, 0x1}]}) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000280)={0x5, 0x5000}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000180)="2ef1499f88637f8e358b8ea5d47f1104b4bb3344107de2aba896ec209a84d8d96f4e0f41bda6d4b62a2a6b638e3cbf8fa5bb2da09046e0e17ca6825351fab4132832c60bb4f6c2d8a2057713e0fd24a09a29e7c7dc318542eecaf373cb0d131c4d5c70e326e9cafd5fc45c5a5e4425e72bee6dbc5baa7e072b9fb878120b5db630d1c65a0f00c1c750badc3ad8529bdbefb1a887fcbdaa075356f9b95c413951357b64f1686f8800eb4e4df1a56231a90f78022a") ptrace$cont(0x7, r1, 0xffffe, 0xfffffffffffffffb) 13:40:55 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34430336d3aa7699db02bdede7a179d70c0e67b756e40cfba7a6c4df3a57a09c2a35e43a75d8415dbbbb05074bab5b8f1e90c72913ac978cb74ad2d7f92967e88111a29e46d00d1433fa794cb13f04ab412d493a3f89a4f6e774d07f58a259a3de8a5ade634d1724db2e0f699c16c174e3c9ee3d2aff8600000000d11ab82fb2281d4e945e0e54d7f1b6f3fbaf088f8c4a063c572f7169eb9e487834f66b7ff939a8d0d53e4a465d17d19cb99bfa9a4e947ad143a84b2b5c2d923af956486e2c8be6498bd2dd", 0xc7}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x4, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x3}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20040080}, 0x0) 13:40:55 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x8f, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:55 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 603.563196][T16677] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 603.591861][T16682] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 603.606964][T16684] ptrace attach of "/root/syz-executor.5"[16678] was attempted by "/root/syz-executor.5"[16684] [ 603.620779][T16686] ptrace attach of "/root/syz-executor.1"[16683] was attempted by "/root/syz-executor.1"[16686] 13:40:58 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) 13:40:58 executing program 5: sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)={0x45ac, 0x0, 0x800, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void, @val={0xc, 0x99, {0xf97, 0x63}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x24c8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x113c, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DST_PORT={0x6, 0x5, 0x2}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x9b, 0x8, {0x7, 0x5, "a422dd5c5ac593884773a94dafba23b9f7c3ceae0a0519288bbd3e19e24b9ec24aae51572265fb962b17ed6fbd9a1828ef7cfb836d4862d0319a901e3a5985f7874668db586f67303a54b2f2766216da2a507ce7ede685b37720c48755d3983760d82081dad829545626e3dd30df9c0f43a38d386b2ca0b9526082f52e9292f860bb3089d9c49a4306f3d415169188"}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0xffff}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0x400}, @NL80211_WOWLAN_TCP_DST_PORT={0x6}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x100c, 0x8, {0x4, 0x8a76, "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"}}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @remote}, @NL80211_WOWLAN_TCP_WAKE_MASK={0x67, 0xb, "3ca4f81cb162adc6b905869c2d431bdb644856eec13090ef228cf42c8f519693a1e26159b19dac4e9c3a740499f9f0a7d005b217df4fb5dd9dcf3f5216eeb236c0597d60a8b52005233a58f08b8b2f4af8fa132545c02fc976247468195773ecaaf8f5"}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x1384, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x5}, @NL80211_ATTR_IE={0x184, 0x2a, [@perr={0x84, 0x69, {0x80, 0x7, [@not_ext={{}, @device_a, 0xda9, "", 0x6}, @ext={{}, @broadcast, 0x3000000, @device_b, 0x1f}, @not_ext={{}, @broadcast, 0x5, "", 0xc}, @not_ext={{}, @broadcast, 0x1, "", 0x36}, @not_ext={{}, @broadcast, 0x8, "", 0x19}, @ext={{}, @broadcast, 0x8, @device_a, 0x37}, @not_ext={{}, @device_b, 0x80, "", 0x10}]}}, @random_vendor={0xdd, 0x9f, "114ce469f6e212c00afbb37ee22bee3ef291827e8a30e5dd2561e8d9a00dfd2fe89033fd2e0d2b383fe42b39d846081929440c6c5d1052e7a27e59f5b7be4648e664020149d05448028e23094c06f7d1c8fbff8bcf74245c081672e7cde82d20c7b5429a21728ccc1e18a30dab74f226421132f0f41c707f55de164f776ccec160c02eea9066ae7d069bdf9c92aae1b2452cce83f61d3e62aebf0186b6d052"}, @random_vendor={0xdd, 0x72, "2d9d33e4726144e75fe18557460184e2488047673a231a03cc458b1cba5bdd5775ad6c05eba8b62598de9674f74d646437e4f10cebb57415f8b017192cd014334420985346343f1db176c9804c305d6a668c4030fa4e6d50d1d79f16c79a98b514c41441798968dc76d6a41a1064155f5ebd"}]}, @NL80211_ATTR_SCAN_SSIDS={0x10, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x8c, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @from_mac}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0x1f, 0x1, @random="f0162e870c38b9d86180b0a923d6aaa761a2035dda452cfbc84acb"}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @from_mac=@device_b}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x1}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xe, 0x1, @random="beb6dc2ced53855a63e2"}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x14, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8, 0x1, 0x7d4e}, @NL80211_BAND_60GHZ={0x8, 0x2, 0x1}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="fff0427e8ecd"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_SUPP_RATES={0x113c, 0x7d, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x1004, 0x3, "c524c10ec1dd311a3aa027b1582a32910e5d8455ed719e75718d417547a985de239984d6b69ca26d93be91de0f0483eada4670bdab148378581df3e7a9c67fdea9429980391a327f145bcd2e73d4107cb9db3eaf9c6f46c7ae41c6a6041379b7ff872ca085a162c0c9f1f701fd3b2543be6216423f9dd776f75199ce601f489e775f01be5dc6bf4b484676732751b61f60dd109ddc4880ed8cf4ded6d8158265fbe479a57c1ab2b826bd8b1d0affb4d959f36aec0321b220bf1ac377567bdb897d1d4846b2490b38e4e86d15a6b636a78f7d3aea836dea96dfbfb40fb0a03128e8e00ca2b9cac7844603e3253d17a076f8e470d03457ccbd52b1cf448a801cf1c4c58264a4c6f3a082330300cf86fd8ab6920dee2e889374b55c13b47d7642d69ebad1767b3083d06665a9b1f59c889b2e9b065397165cd15723243f5b159f62866df15270f14151fc4e3b3249578681655f13ec26240adbadb18fb2a0d519f7db9a6096f59ef329102f882ee0282e7c834413485ae17eb936765dfceda6f14adc9cf88b3a8d023caedb42a6b915945d9728761bea2edaf28f68dfcab95c90d4d1d6a690ea0ca6ea5318340fd02682d336d384906d17b367cdead2cc97936891502f9784fd6736127e7cb76a98ee478601b2b7113755ef5d0a8a2c080bd2a55af08e0cecdb999c72a318798c713051da4cbe8bb3035ccd245e8b2fdfed87e34d795d717f3770adf09eb7474024607e580d1d39dade592c51ddb2fb93d68e3cdab6a3e69249926a231a99d474017a254a9c385a72f9f30928a338ba1ed3129fb54eb78777bb5267c4d04765a2ce29d117dff340ee4a12e8a4e0d9c2b81961264ba6266ed4ca583f457cd462e7dcd36627555ff04e07931364b651a5d0d866065115081ac9e4fd4e1277c7546d007090cc904d5aa49fbd055a59a1c2ec6c39f43ea030a8b0361daeef4e5c97539ecad84aaf0f8543ff30d4552b1abf39234add825a62740a31cfd87c59c4ebcf08bcd726f46672d722d5dd2d63184b178ae08dbfe6037015d8f7a137a480fd5359c1f10538012ce8355b87286682ee51a2f3964dbfc56408ceb514f3e2eaa83adea2613c41e34a74a1ea906c0b612f9ebc00eafb765564eb23e991113a4ac8a1490d35cc58f18e690034294ae3cfa8841533a30d2ba8da133dc0784f2b875df73673899799bf88bbce8810ba769f8bef23ea1a95dc6257e4b43db36bd8e4da913f16ecdcddb3159d5c5dccf4a19089e05e1faa05e126d66c7f8a637ac960039a6d600234ec1c5bb2e041cfa5359c07b083a0d31739829fcb95e10e02a994d30c44f2bb599eb41ccfd441f95ba1dd0f3828b8c1b3e410a57be1f35ae584b4489f6251c661c66eabceebb0890ff2b6c1d875f907b4c2edf2ac6424118c09a6be042d1f3e24e85d1f5b44b3e930a0834bb7b0ea96c2dcde9116f5db46da409b91bf7725c6cd204355d11f811de1deb4b63fcd4634b16cd96847dbd7fc0ee9c2ccc88c0486ebad2d679c4112469b9c6652d374ef67265b64dd6a039ca6cc625c5b1ab4660eefccb75cde6f0be4d6da5b664b7f19c102f50a3fbf2b7c78ae72bee0b050a14228b2163c353ee08f901ed377b0207cf1a280c4465e2fc781e78e75058a5b846a463d3c99cf6088b307b2847ed6ad0c1650ec7493170548069fed9b3fd6d954b8b30a7a70eadd7e86efdb6b4dec6e6a3d61800c88e6281386763004c5eb0c8fdf1613d45fad0ef55811362984200668a2dc69e13890cb39c201d74724c24906c598011d91926a6a7f6b2dcb922b3e225ddf55900d5678f2a2378d38d7ea81883445d261229147c93072f500d5b40955a72130944d87a1f8fe76a6c984befca56d2918dfb18a1db9055f2734d957a819c36def1d434093e24aea1c9abaac9565f4a027874c13c58ac40d4e51aefe0d4bb3cdb530bf2b9484fec6c0839545eee15603e63f7ee0a9bce88310a25c9cb03a9db87e1701601fd0f2c9dae675c1bd564949940f2d4692581164b637f91abefe9196ef184fd790d8d8de8e107cb54936a3af0f742f629f16027d3f798b62c0f4e99515625f242790ea5ed3b5fd8d035a471b1596a9e544f5082707b9e4240bb695c13de940de38726f227139c4f181089d8ff8c59418d29bdff89ddff8a7621c1dfe1aa1e82773796d280001d8d61df97cfb937160e297724e43159c70ffa2433c185678dc0385a1aeb5273da03705cfb66d90db6338372b07f12d67a2fab8035930160b8b15af2e450e06e5390776e73dacca0f7887f37d12ea6e68516b962b28d07fb99d42ee0c6505a8e0102623d418d4110b01dfacb166dd7b77c3638c2392c3dc4e875ab7a5cbd145dd6ae8a037264be6e6b34273666c8e302dbae9b0257ca4ae717931e2392573c11251ae81ccee5d4d4cf7bfe274aeb339f55cfbcf0b3999ba4f335bde17c4743b2029db04031d9cab52989d05b72008324b651d0af5fdc8df5bf4d9acc5dc979d0c4440a875fdd3fdd7b9a067eb7922a6f01071fe98588a038cdc9a60d83acd93ddb5d2fb1ad028798a8bc5a5f96848944eed46415b5bfc081b5888f61de97f47da887d8f815a50edb525ebf8ddb2e5dfab5ea6a0a8ac204fc86b2f72fa2cde385129ec007d9c5b4da89df6802e9a73da98107729d4c6923dd865f17a95b5a0234552d3f3cb71fa32a14ae40b1f7e5a057d95197bcaf648695e92a3d7aa280da7ff36bf08f94caba28dd8a414bd05f2051f34120164a416692a264724bd518928ebd94f4fa5c5a42bfb843fbca64674c56f115ffa349aa48e0d778b44e13b6f36cf3a4adc250e1fd8392fdd18c79ad41697bcda15a1bc9bb4acb3b76df881fbeea80c2373533e91d70da18731bd2993ce9627023e3a0cecec4daf49783fca083223a559a8a14768fe33ee7bb063567a461f3f75c6e5b0e58bd8afb2568f583cfe91dbf0a188777093b2019c7dff45f0392cff9334244398392e945e5d68ff231fa39de0ae3d38a5e5e4e13eca51f2cabd31f88c091e7cb6fc35cf106fed579a74b26f2e71a5d059049dbbfd64c9d8ca3d9345f41630e4c8730fa4cf86bad5a598a5b49be932388724cc97cacede9b557449f9eec3622963b62ea388d35acb0bd83f26abfa3f106f25e2b219c437a8bff17a56707b7875445dc93d734b21acee54d59534341209abb08fec243dabbeb6e7f932c76e6fe8ea6d6093e782e399e0b180805d113ceda38167ee261ed986b228a992bc48f0f7ed03513f84c15631eaa61f45a8ce2d975939e30d91be27f204fd8e1e7465e13a02b8328fcc9274d7919b70fa4379e3825b382375b56a76988a8764aee5e69e5157cb888bad625a96e3fc7d6ca70931f84070f3cffb49d78aa6142f159b7806c73c31c17e4116051e86a77203f4a7d946f54187fb750ad736ebe862f9b089cca2d9755d25b11b4d4820a5c511d5767180d17d99fa9dac38a0b451f74b54439652884f90fc09c4fabcd4a79e35fa6c5fbd770b532424b66ecda5a3e8b65080c0d24d488bd42cae79d7cb05434d4a3bed73a8e5a7ae4893ca7cb16ce9ee11ff2b5b720a4333c4ce66b965b61eb93ac1bb1b8a784605a7a488d59fffe69382c2b65256cda7ae13e46f62af9d01f9e2620d9423e88890fb2b07cbf65ab77e3fdd69d22567b06e5272fa9729d338d9fb9a7301133be70fa7942d49ee29584a10e5357f3607ebdbe3aeeb71873394872239253028646d0fbd6b8bee647a2380aae1151ee48e1f3d483a13dfbdc9ba89bd3dc06fc66f1f3c2ea56c8065a5e7e7c9d957bfd2cdf13a51056214357cc4539b38003d358b76f9a3b0603d824ca45945faba09ba0012f75806ac5cbf58efd7f9927c3b376c30cec75bb6c57a05a02b3e18e916b9acdb6493120d084258121728f6511ad7eb038838f68743145f4b38647b1fb5e6b78a773403687015572184d84337b2803fa10d01a26abc2eafb00d7c9cea1ed2b91bced9027093aede26928ec2d32577397fc0724a8d2f5429f472745ad752f1ec25fbdc1dd7f61fcbefecb352e61482b553d4acfd31b07e2205ff476b825d6e74cecf928a2d0dfb6faab55b4cd3d9009ef611f9bd349d9a30c551d0123012337aa4f1d0149c769484bfcc4fd8796f57c79bb0fb702d17dd4be82eee9f78c227f9ffeccfa37dfe1bd59f2a61ad5cb2f7f543a7a4c79eed9b9a2ba939398a5808bd16245bfd46433affb84c6377f2fb79aecf0d4130905371ee6d8b50005ab86cf9ea72e5cc7a3d6cec0894d2185fde5741a8516f6b48f9f1a451c3a0f4982a8f3411b4a3863fa7e9da7120afd5fcf1337fb228246da31dc20ca376c86e96bf01103babd2fc5f3f63cce5aa79dc59622a26dd3f8547d01637969576124e94206d030dac6fec22593498763ead62cd8038999b6e8fa69a896209ba00ebdeae591ec5e818a312b697679cdc3fc002870dd6b57976741a60cc0ce2032c77129e2aa6a74c09f66820e43a9c29a7b3dda654fabb0a9f1dd8df93d04c02ffa9b8aa9fd60836ed23f50756eb1525e4c961a08cfd0f08a680fced6b28731fb010962c92bae2d027559039252030214de35e6ab2bc76cdd48fe7ebabbd5d7f632d7896d68998eb1748540f4d1c2b782bc8107020288c361918524ce0e254d4d26e29d731ac497bf957d17f7e75b5f7ecfca131ceb5062eb46504c3c1f48e34b71a69deb6f145770b2ed0ca6275b1e39c0844aace2c32df020789c1d94503f724c362f2130e068a7051934f126e4aaebd6c63686b0c718b46a3f63037b97fd0dbb9cd17b338c210d071f816afe0848d934422902e98c0d3eaba0ecee44617a958dcab2159c7f1845278e4ae0eaa327491ef4b3716632668bf548398740d2f0e9e018b3097411fb7e6bdf4cefe5fbf38b55190cc2d552adce2eb55a68679f0146d4f4cbf0f00ccde9b31ae0ae9dbd2297bfce3702d30b0f4cae4892dd455e581f25f14709d2d61689ee82c5d802f7d2ace3ca7e8ee9e2449e688756ced99055a66ca41d39819277905bd955168b5827f3580cadcce27f0f020c1f5bf1b18a15f302686f93a8ccc2b8ab2ac48fdc1acda972e0d655864c152b83bbf233b51e23c349d63fd16c716a5c4cf81c62ec64e98ca3c23414a54b657fadc9a8c41b7c00d4fb2058df8a01d252ecce29e19122aa080b0b5be4a33ebeb343d1415d8bb83fa5601dbe2923ed46ba5e61a4d31b12bc22335360d4b7fa431099a49fae6a53fa987df846ca51971d3d7ac77ddcc0c846dbc01cf0b6831dc8e478d577e31081ac0239300e9ebf33d427ff4a2ec0e235530d570d75995c57a4353b6917a17cbdeffa18d9b0d16d57dbaea33046d68707f8d34d006686a5937008576c7c02ecc327cd386e746bef6d4126ddc8fcb5802bfe923c86bcdd1a722cdfa02aa0079dbd4328fccad5d96b1f81745b1fb1adf4b3aee428f9139b6b15aa0bb719e57055b400f0710c5e3eef04fd89b0d4b0c4067c90e05440e8425a3fd30bd161c62a8829a2107f31355ee93d0b0afcb5b1902f6afad09f1e4d443ffced28b3390a392a746e1baea8f6cb08faaf6190508778a8a9f20039baba90ec51dd7722fa8f49335a94f868627491c520a15839ce95b683053fd15eb48f07816a5b776cedcae964cdd5f27891882442b41acff3fa4065eb595ad0546242e81abc727fd8ec3863226cdae0c819130218749cdbc3765a0254a406feeecc5b2713d3d3d0e6ecb787b977e1e8fbf009ea98a111ebd7a45c61fee05e8ce6353149be9d2b7fdc283154548172c396f887bce9d"}, @NL80211_BAND_2GHZ={0x98, 0x0, "dc4b05502f733cdb8e47a5c2fbcfdecf70c5cc2c4e56ff2e661719f889e8cf1e8783850f4baef8b381133a3660107938a645c130d84618a69e4d1d03ed526784172b01d0a1d1cfe17dde83f171a48b7731a356dfd390ea1e600f2a5884377b8e643f81dd10c74fe7d171e26232d82944c96dc7d3be6698c271256ae2a7f4f5d7bae1ce738baac7729ed3a904f11e282b13293ea2"}, @NL80211_BAND_5GHZ={0x99, 0x1, "3cd484586df5c1c0ed5e0fdd4762b62f1676ea14557dc2e2b0ecaee029b66d56166c0e18dcf5385de8f0e3438eddafc5b9526705324b4565f3c84f72586bcce21015e9864c9885ff053a1f5ecb68cf861858ac15f877ce39ae297cce4d3e08d92b52ac9fae91399a78ec9d10c91e4049e1d97490232360ba4ba6decb8153b00b0190f5ff3d473ff05201fc55bf6a889e189e6f50a8"}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x1}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0xff}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x618}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x164, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x44, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_FREQUENCIES={0x34, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x7f}, {0x8, 0x0, 0x5}, {0x8, 0x0, 0x75}, {0x8, 0x0, 0x7f}, {0x8, 0x0, 0x48000}, {0x8, 0x0, 0xcbf5}]}, @NL80211_ATTR_BSSID={0xa}]}, @NL80211_WOWLAN_TRIG_NET_DETECT={0xc, 0x12, 0x0, 0x1, [@NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x2120}]}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_TCP_CONNECTION={0xf8, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_DST_PORT={0x6, 0x5, 0x9}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD={0xbb, 0x6, "0648856e2e40eaa68a179d11da31496da12a3992a37ef291ee4910ffc178b8dfbe0fe2c0fdf369f49abcd619b517c7ebf1a1cebdea47909f7c0d23699506211a5292695381c0e387d47f1ac0122d2f2c653c8d05da2abdad3838f198813c30308f98e1ef6e932fb9e9b339ce994116046fb59b38e5882d511257aa8ee9b78cb06dc354133073880b8372447b60476dc95b26a4a736817d938960f5fe5bc469cf77a2a9d87eb24fcc6cb6ec0082a3613f1ee5b26f98861a"}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x3, 0x3, 0xd6dd}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x1}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0x3f}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NL80211_WOWLAN_TCP_DST_PORT={0x6, 0x5, 0x6}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x191c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x18f4, 0x4, 0x0, 0x1, [{0x3ac, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x6d, 0x1, "7aaceb0e4ad4a10332964b59feb8e4f92f408b66c3f00df369eb112de5019a1a1d9d0a284f69cbcfb9c217273fbc933f2f791c9f002d68aef4abe3358dea780c1a58862ddac9aec82ef1d5c87c2183919536afd81ccdd288238a76972dd004c94cce2d9c318376ba6a"}, @NL80211_PKTPAT_PATTERN={0xe3, 0x2, "51bd992819c149279a78ddcf41a85a27edc3f3d69d14f389530362bec687d56110110ea120820a7d52800f8f038d078ea8d2871bd75e3bb25134d7ee0fe2e9c99b4d8e04de836bb40f6698d430e71d53cebcd71af3839b03328e1993439e369a03d0a513e91b51ce864c33dc5158fd457a0a0d53048cf964da0310b9cdd43f3c91d8f01fd2d2f55389d8c64d2c8f41eb0f6d3756a83caa8a9dcbd004dea110116a1d130fbc90bb6e28e8f8cb2d3e601711bd67219bfad423268cb907685a4ae84f8bbe9ada121e6af4b028e9f8de450419ad5eba06458a4406bfcedc2da32e"}, @NL80211_PKTPAT_MASK={0x7c, 0x1, "bec912bfc7ef698ea83a306551922a19cdb78aa8a1d9a13e831e71d3863615be3cae919a23ffa18cd6448448a53e590ca096c8415a8a0aff6e0d96b4f29d1e934a4c2c7aeb849feef6176e43007fa2d1da6bbeb6201a51a607fcbc2ae1b80f482871935ddf1e8e7abf50ad1daf7d028cea07ddf98ac6e042"}, @NL80211_PKTPAT_MASK={0xf7, 0x1, "5898870dfcf931e9defc1216d844db4f5763b58708bb86ced63d9177e3f8e9a2946e6c61bdbde3a9470f1ba374fdaaf80e1a30b86229076a54157d8896242aabb48227156856f9e34c79a35c4d238e49ed02224e018d0839b3c1d11122861cc902b9d9a45c40537986e5a1389a7ee4251404ff125a7a356d8d48367e3c30e2aa6aaab6a567c3a902f453dc04988f5e8acc214d60cc4555124967468d335fa6ddf9ed09dbaaf394b206873f1e398f70915e6527087d4b5c3b27e1486984b3c2c2de5a390944bcec3ec098e9e719b10d78cbf95df9155a6bc14d1b0f7aa80379b058bf9fadf4e24196b27e760bc608f80e5541cc"}, @NL80211_PKTPAT_MASK={0xdd, 0x1, "806b9fa16ab7d897c3d511a156d65a08889c203007eb4c906d8c1060ff5cefb065d27427e9537d6fd96e32d989cb16d263442020b57f057af2aa1fb2f194d1b82af8e43fc18cafd69185e5c7c8c1dc9a3c32d05653fc449e381e2b48f66f8c26ebaf3d5f1dc8a2330954f1d54ec1e48b0cbf168b2c9370cd8eb23e7f5f500d475b24ddc9726f03f7e7fa539c3240829a1c8a228ea9673953a75540423293aee19564ee6fb5a36e465dddbc89b43e204087c85e9ff1c7c879f3c22c0136ad9b1b60d1286dc54d0b6b718492fc2e74463305264d8331127dc923"}]}, {0x1334, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x103, 0x1, "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"}, @NL80211_PKTPAT_MASK={0x2c, 0x1, "7fc94c41b9067f1c48685f8ef8433c053fea8fb50df0933d9683899f86d88f91d201201eea48c269"}, @NL80211_PKTPAT_MASK={0xe2, 0x1, "9d73f59a6da9968a247c201a49a4aa09866a1e409f5b3f3ba079435eafe4e29c70033dd4ce13f70dd216ed21264331d8c1b5eef7380f2a90559a34e526094210c4d11a42903b76dde9a3b7181c0fb9c6d65211d33abab5ac982abbb4b17eb418d6c26936a71a806990b35bad2871d5b9dcf9731b6be57872effb663ca3588e7a491a895aa2619033c1c215483d5b6723410fa40e68243e8037d2cae8fb7442fdf355daa605b306c83ccbd6c252cedba0329ac55b812c0b7579fda1282417782b89583491177dbd63f88ea59961de1655e2490abf20114db4351e188c110d"}, @NL80211_PKTPAT_PATTERN={0x1004, 0x2, "0b7fd567e8158137d71532668a99e2fc7344f32e301b06f5227b664e518253fe0257cb8563223a3dc19bc55b4a0ef787969b1ddcbe29a36d9d7bb628d2aa4f9c50a3e609a7044042f76853c68dfbc5ad8cac5dcd5dc86c2d0121dad4a1e62b184dceca0d658b381cc4734851dd56c1787be03811b49968a70063b8caab0eacaf26379a960610c0ee89d423bef8b17b22c1f39f7b4737309b6450dacb08273ea0056588942fc85c6887a4c61ec8eb7fc8d83570b37e3a3dbb4b2c9af55e03a808ecbab4e09fcb5241b0c8ba97da189bf4ca7f93545176cc5f448e3bfba61b2c2108dd4aa3979681433799e6a00ac448a48c798655805b8d3e74d64993740ae9663cc4aee34d4dc239d2ca62005aabe13a574795b58f6d07324ad515c3d8f345c1460532e51042b3f1d9de3730d0a41b716b5807fe0620bba6e41386276bb692d694c8371e6b28ad06ea0257335051739cde09aa6525f06ca0d1f0ac8fcccde654629a9cf00af44bf6cd88f96a6673e74c3637178c767adf0f941452e5c4d2f02f21126b5d8dd5b3b14bab6c3f35ca4f4b0a66723b10496e70d36c7094c136854a35b8017192345957df95289c80f71e77af30f6de2f63ae8372cab58aefe22d10034f125a56365359cb04f371476fd6e2c2a2674c0a5b7f03bf65e09159444f430f4be92407ac23f5d0194718f41a379706814f399efed3249cc61330ba941fea061dad481895a4cb99dbf98ba31818518b7a44e5b51735bead14c755553452e7ed5e10d280652f5a012575485e9d4fc6ee517aace3b26ad8095209c088053532ef28bbff8dabb91d85fa6868707675b2e8e27d6c3c84b4bf13cea18857cd127f1bb371927ba72743b603563629aec95a9856c8cc0b11ea6d7234d64becb972eaa301bd7bafb1b7a0ab596f9df4bc5a86ca3fee29863142502c01d33ee984669feff06f1a40518c66d92633fe8f87e311f692855f39ff625a78b96aca82ab106b457a3d5b69688072f6ba1b92e1b15ba9f03c61c7f3bedd54bc84cf9f7ff31ffc195d386d5cca4909d8e223d942d5661037afc6305b38478845abe4503f33ba3dfd8f157f02fb665ac963e4db1b3a5cf72077d02c835651eff734d0578e4b20050c3f5be4b00759e68668aca26ef1291d6781b261484dc573e83d211b648abe58a338f5124264f6a271eff21485d0a9c2ac757e3b5b1aea2ef3ce8edc735addb27696c5cabaffbe868975cffb34390769c7b16800ff82d97118ccc72e296e6f105fcb3cd90fbf03c44ba964a7f0082bdd43aa00c49b6b589bb33181db538692ee4f025e5a5134372c53843523905d2145a99956950aacf25d5685b6ffcb75db46ac9283905485f52fe37123d13e6af746a35d07b4d64877158649a0df65d1e07dbb5b99ef9ca76f290029c30469ce3f29638c9848b6cb3b1c764877e40fc81f9cc938205964b48f271e6d4765475daa6a6df36e45e2b07ed8247eeed3be494a604633d12662d6af1cf4eba518c7652de2a7738c653f300b184b67f905e6bd34386850a5b90d6b42958d305516369b22c5d9f371941115899268841fada9a4bab0df59be97d100e5840aec5a31f58bac682dbb7c7ae2efbe6c9b51cb242f8621f5c7d783e9662edddb978e1425cc79355d62da771f8b79970c165569ecac253a1a06feaa8d705589dd951c99f252c9397ad0cd6f9bde05f44bfbf40c8df1a2dc3cf81a2bd13c32f0a861adbbe0ad95cf749c745f8fa23ef36764b9bd108ab0559b4861d8b7668de9226ef6e6959cbf58abbcaa852020dff79c2bd367ad89d06e2e1ad2a6d89943321443a946066cf2da162e4e985a58c70f07e08938ca1158c9efe5ab4fd8ad632275933f11cf8419f33b9ca7fbc5e43f2b6ca0c38a240be6624740e0e1e9308939e3fb6f413cda4dcd6be82f8001f255f4884172819449f0d91f55ef72748f787053f54c603be7069bdb27af8542ed22efddb8db44e97c1691b8a8889f2d823bd645d447f3391658a388767938cb372ba2c518b8aa78b08bd1d89557ecba84821b09fc086aefbc56e7e790853a06a85a837cac24f90d4c2f7baf119597299b9c8c7dc1caef40c6f80ba4ed601b2b5416a3097528dce54e1da52f40d84e6e4ea5033f10c860ad18b58e984649257323bf289d53efd2391b2fada7ad1b04d654570c4b2060f7f70aaa1517c87167b0858ba08999faa8127c473886a9b2dfeddf4ef7f279045a7635089f6d4ced6025212578a9bf341f76a06597af973596986c54692b9564c8f4f34b10c5d4d82898b56ba6b02b72545004fae997a40988e5b6817d13f689d7c8f1f35b4713c43455240e5095d2e4201f853266e20ef8d6e8189d3fe4c95df30b4eaaf9392c35eddf5d8d5422acce4cd9f74a910cd81c33463779c12ff66dcee014d251aacb07ebfdd00e14848e1cb614937706c7414e1c0b078dde8d690755ef98f997a96b8d107919590827ce8cef1fc7e7eed27b714a815a31f13b97894da95e837b0709b8f8dae8e6b219947ab50cd353cf9597f1d696c8ac9cbebaede2240354a97e741cb6e2dc48a3073f2deee999e7e70d32f443a4e27634013754da56a74cbcd5fb0841822cd3b55bac3715e4268aa4e7ce25a4c7b30a47e7a0a5c9bc35f81054591c56b77764f094fffd1151c4617a2a987ab1c2dbe77fe9597279c043de1018e53c63e1acc5895d9c2e54e821bbe340f2639ce2b84783e4d4e3b3a539796e038a09bebb284409e0a85381fef2b1f239190d1f1e6897715091ed0a2726c4b5793b591d259c2c0203a2770117d1eef2a7993d7c7b7540620ad0ee579d1a2f522d77c7900a2ef66b9669adf0d2052ab140310bbb92b5ef9edd6ec2c605786a70654cb43c81acfdf709f34202fe342f5c115ef5727c5c04efae22ff6a7262bb3a601ad1f77ef14c2849e2b4fb2e537f04bb140c45517f69c664d22f6eb4e2a58bd56e4d1f97ba867fa929143929744c7bfdae49778f272f12c6240de42e9ab523ea31f498c786dca89bd772dfe4ebe3a0bd6f5df3aa0e83af10f5f7f41bfcd979429cff2b374e7b7118e40185f6087c65b9cac52a432fa3b80362f6a489f1c028302e5389bd0730f14318f45a540ad028053921a12a0f916f9f447047754a0276c61242a5d4890e479cc3e53e0f21105b5a82c43fd3a7193ff88c7940f30a2c35066bce93a089c6d634eef10dddd0811161264dafa9a76ddb34f45cb93f7dfe63de761fea18200a114babbb9bbd500a76498180fb74fb6e2dee76c12217d185d927194af3438b71887dcad813fde969827baf37ddff0ccfda925038a39328eb286f4925865faa889095f1c24e359cd0770746b8cf7ac9abc1173377bd97acef5484b5a6235f76da48a641da1ab7816a4abadb078a6173239a6289b997e239956215d92540d0f3b28bef3ee3e08e02e3e7ac36dfa30ead837da86cbe582c42c45160c20b475616e5ff653a77dbcb1495a8f755d21a3cc84f1891e8e1b0904d1a2482218fd8198fff256e9c55c20cd6c42d0f41c30480bc08f8a00f3ca581ee32284196e6a5eb993177db26e06261aeed6d286907b14be80dabaa18a29647563e859b6be409d7edb04d8388765bacf070377ceb953d52b0915aa238b6e3c2810683b2a29fa698a0fd71cf6578d9f305c42c736595c56984ed7b596c22762e2c3c96fa4240410bf67766433f410ba8bed92c597a04b83c4e4965ff57b7c8c7a00d35c4bc833a7c77c1b4b5593575f2c70901b27a2823806465886aa6ab4c7c73bcca648cd3867bae9c6c7d1684e8ea623d5077221f77c039ba165d1eac97c2338eb955fa56775d952c2ca7bda6e8cc79bec100a9399a6f8528ac24721ea576803780d9ebee9aa01870ebef04c8c69c74eed894e0153ae79c3f101a659071bee65007ca0e6dfb53fc2d21dca29433aefe53ecf207c12ad58f5234dad2ca6a5321d71d9b7bf2c5b97cda50c39f72f6a1177f43bebd0d0f18685d5091f4d0eba5af673749be9169c661f72e1d8877c604d2dd600676e1724db2dff5fe49a56be3203aca9842f8364e305a216a4a7a0046b03d9ebd47f2e9e978d1ac5b9ff98089a621b8a278651dd846609410bbf37418d11656b744b7f735eaa4af2b777b4d4678a1301afd6d6baef1ede35343b9a935e6f538799c69d2934b882ebdb6b91810d68aad999ca87e2148ca4f08206de13492ab95ff0ec9d141095744601e7a3e94bccd4277a6cd991149cecfeefe8cd627e0caf25be1764f0ec3b3d274a89babff31d603b1b920e52d99282e4efd451f73a2cdfc3ea9b27ca8d679d68e9bfbc1767250b3affd4f1841bb8fb76e52ae967ee9c9ce736e952f8d08946c39a5500243bb3c01654d95269f188ecbece7b6dcc16adc76790dc31225cf59983e5a2ef9b437fb1ff7ed1ccd0b7f29bb1bdfab071ad18d62349ff3441e5bdb05390ce1c1568435d909a251c9d79ac65434d1faa571f9dd9ea437b6b7cd6aa003cdc79eb6f61e55c9f956ea5097325b7415a4506f520aa51496afc2d7ef9b6c465076b9e8d5727cef7ab9de74c80bb2cc6effc261d6ea03e3289e54e4cd6badcaa7bfe8348142c86f518349454802bd0c9d96946c059dbd80bd9fc94dfe77d239759a4a0949e3ab2f7e2e67f2fdaa3031e8f990860d3d814d25d130e11ee7b0854dfa950852025b23f695211012d50320933483c83a3434505de998be9d6a68b32a8df82416b669a2b961083647fdf48470016cec763193d0e17a877cc3de29a9317c5875c21172a785e608170e53f1363bd38ddcf70824ed27b818f25d5eb3048de649ff28f1ef29de2765acc1f9ac9fa5ab0382d8d5c8f49616b1693234ea584904bca054d930275d35a17d19c599be8b448da389d47e5b3fdbc83802772859bdbb10348f8cd53d578fe511074abdd791ca76ff98131139376da3c7ed99b70e6c67804b08f8a2a55c8dbb2d2b2d00be859a33000598987fb4097a7e30edb2e98318e3dbe4a7ced77d2b0b773eeb5a267c2f4380ef3f1b25cce701fa3d86d9eee7a212a05d97eb1beace505229e937b8a5badbca9afd975b32bf6662196919643f0d7318840777acf62a82a9086c3957b2b7641f05e1a8c5832fb017fafbd0682c0cac6c1d4d3545890260b515eb0d77a7779bcc17900eb0503863b1ed88297fd13794044f48bbd3ea76d059aeec1522563b7cc8e9f2bf62977456f2b55665e544f5ae473d15d72e412b3d5082c000d640ffe17e0a314fa9342047c74d725ed718ba3e41db84f375495ca8d4b72c32443968c22a051cef09dd4ad4046de24ff6e4728bcc84ceed1adb88367b61b4eeebdf660df144e69646dd13458997cb30cd852451291f5a6191d59e5912b18b61c88dd48735e689bc65873f02fa13ab31aa9c351819f36c2f96dfaa5cc906f05247edaa04e88a607b13b93eb31ebed7b3de778eef5d0c626de9df7b05ae65d776b7fad37a78b64287344bc0778020dba6aff1fcc1ae03b01127f4eb21aec12a2cb962bd93b9a99f9a5b17bae37e9dc5715a723c7feece73b4044572497587f1a8bcb455ffce38849818bc83356ec316a040af4e60937e539479c3a0aa9eefa9dad6e6b0e22479d1e5b8a8c9a8002fab6a31539874a3907cd8d5903c38561a3ea89aaaa6963549ff711b2e614e06326b30bf2a8268eb1cf546cd3142f795fe1982f4a2e7f464a24cc284318df269b04c0c38f09c0662ca750df37c7e905e4e318abc1213c7dafe9db6a06c9dd75b89dae51e839e0817c2bbc713f56d510945d082c2751235b02c04a66704"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x436a}, @NL80211_PKTPAT_MASK={0xfe, 0x1, "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"}]}, {0x210, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2}, @NL80211_PKTPAT_MASK={0x3b, 0x1, "b6c04c6cacc1fedf4fce581395e9dceba24461514c619d269d58f74f701d1db6b5886bbfec5088e206be605de850cca874c3dd85cbe41b"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x81}, @NL80211_PKTPAT_PATTERN={0x59, 0x2, "5850bc44a025c75de47c50bac04d1981ad5f4fb9c27116854e0c04ca2379cfc57874c4764cc69f0c0a2e299e871c835c96964e27dd34ffe8a2729b57697517870072d0d10de36a161e8fdfc76d7e1393883dd45b3a"}, @NL80211_PKTPAT_MASK={0x83, 0x1, "ec252455c639e577cc75a8045e3223cd586f0e2094e276e5ab75aa8e6cf0af7e4d1a601b7947b3490d869ea2cf0d41614b1ba5fab87c49a1ef31e5037a7ff6e6545f70d76e896a4e29658106419e5010e3a4af200a8a997a2c1f29af006cf0627b454d3534399f2f25a4d34b07f7a45497a8f686a71c63edd66fd651b0efe0"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x5}, @NL80211_PKTPAT_MASK={0xc8, 0x1, "85ba38fab523aa4f479274b46d3e1556a449ea30bbd1897a542ca133faa1b95d7b43085dfef651fb50282e6ba4c0aae16243d288712bc91aa38c95cc6ab090ec635d02ea2a5814e8d9d4e922669d5b5a91349637abeff00273ace45541c99acfd0661d70b948166d70ca993e55e3939aa561ce0b05487c81e6805242c0aff1bd8bfd8f3790bee468cd1c7894cde6571bcded2c4c155a4a43a58b654a37a949bb95fea26c73f9a4d9f319f2f4f304a4752b9f401d480eed883e77f0ec410fc15a59c17e1a"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2}]}]}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x10, 0x4, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}]}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x61c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_PKT_PATTERN={0x604, 0x4, 0x0, 0x1, [{0x1ec, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x1a, 0x1, "544caa8154582be44b949c8e462796944675f537ceb3"}, @NL80211_PKTPAT_MASK={0xd7, 0x1, "ee60b6893a8f30e834664e1696b2f676e14af7f0143c907509bff4304a1f8041008d9c9684a7a524d4d2c9f0b8fc84e53c88ce46a1ebc8c2d77be0f7ef9834460ab76904cf55121c03900ba3f818b1906abd23eb7d322f78a9f49e6ebd2c0e39631c407817f61c8e591ec929e0353914b4d73440ca8fc8b2b060845cdd9192c45b6df36149f78bb36999b7e1d9f3b3437e3792eb2e31550ce18b81a44bc3eaffd85e1bc2050b66ad9b5ba276c613d32bb6e6821575d8ada33e56110dbbad4030265f3c2da413a62efc786242b93d6ee03fcc1e"}, @NL80211_PKTPAT_MASK={0xd, 0x1, "748f43f120bd77236b"}, @NL80211_PKTPAT_MASK={0xd9, 0x1, "6c21e92fee6794da9be81e080d3aa109f12bc7b44f9abe01104d6934e4575899e6efbd01eda8996efd9e61227a9c0a7536699a87b5c6d89b492c51ee9469d4396b9067119337f5f018523e8b77933d11bbf1b7298c67892d61b14c5301d9e57de581ca278a634ca185200e0d4eb985ceed8d0a60d0994cab31231b9f2f86902e6ffaefee96eb98b2fa0efea3bce97e8dba23396db67602a3c444c3989ecc7af30bc5485e31c6b3f961b7c78496df2f36a3599b2a8dbe49f40d190662524ba10f54f7f8f16ee5023fe36cf8c123d4166cf518dd89f7"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7}]}, {0x228, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xf8}, @NL80211_PKTPAT_MASK={0x8e, 0x1, "8988b433212e41c9ad4e835ce415b17cc7e1fe71e08689e45aa927a7df54d6ea5c4277ca8b55a254c501fc280a181ae00cceae82a446b067463215c3583dd721426da4a32e45638b31a77137a54aa19e0e8b59e34e30fb691e352db63dedda93a16893d821159169e6d603be29f6d054f74593c8f611b4305cd4f894d9373b023caa499c7ea2b9343ca3"}, @NL80211_PKTPAT_MASK={0xfa, 0x1, "29142fdbbffb9aee632b3a0d172d984096a5824a610e53608313f1693b5b3f2c928b6483678e516eecbd38f6660dbeb1cabb97daa8fc32c6aefd93433e4fb3b13004849582c44b03f366b61e7d1f665c24e40fb73f63708bbf41bebe302c0a6b0fe86d9ddcb8c09ee77f9c6fbdf79d7a0bdec402a684c856402895fc816206dd1d75b6e5892d0fcc4a52994746e4ed0f9789e709d88d22e487d0703b7a0b0bbc6c72b84f772f94f966d3bdaa683b3e7a1d3a72c129d34228ca88ec5232397da44076eb6572fe4ed81b749992f51c6d0d71e02bc223249c1c534d23954b1788c2b2a976ce792b07bc309a269d7c2b071dbd2c2aea218f"}, @NL80211_PKTPAT_PATTERN={0x4}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x7f}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0xa4}, @NL80211_PKTPAT_PATTERN={0x6b, 0x2, "2a5575bf71030745eb7e221c168773c94517ada059f368bcf078e68c3e69e574d23813479c430793dfbfd809516076e9bfd10fcd2d8fea81d7cdd0340b26b03346f3e1fca1b63019745bc7a0f936cc1d93c42cf834c1d4f14f2ea7873a17cfc485e745b16323b6"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x6}]}, {0x98, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8}, @NL80211_PKTPAT_MASK={0xb, 0x1, "c53cc17e4986c7"}, @NL80211_PKTPAT_MASK={0x24, 0x1, "44833ac110c888920ee5b3607985be5eb691b6b844fdf0ec7653bcf527554321"}, @NL80211_PKTPAT_PATTERN={0x5a, 0x2, "0bdad8c4062cf4aa0d93b3c7fc269ed17da7a69834ef6f520c48ad08f6c67af403e92102e405297301231b7fccbe2dc230b6960b13eb6cafcf30d2f73dd604211bde056977480703532a0b800acb3ffbfeb28d0067e6"}]}, {0x154, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_MASK={0x30, 0x1, "fc5fde9be65311fa3d2b18dcaf1c1a6bc94fc4bdb4360baf834f1d16d0a731a820d37f0ad08a087488f31aaa"}, @NL80211_PKTPAT_PATTERN={0x41, 0x2, "bde0aaecfcabf306c09e97712def14cf4f70b019dd110207892ca1a7b6963390000084db932beec8683db042203c1770e2672410da6a1da064a4d72085"}, @NL80211_PKTPAT_MASK={0xa4, 0x1, "25691649c6d29c756d7b5b3e9dafe2eb3e180fed1e91cf427b7fcff8b59d7af59ccd1662761f55793654b4bae88af05e9aba2afbc8e93b9cb27acfd76ee1b6e27be3da333aa37f124fc0e5176195b530bed6792a9a6a918fc736b66f0ef4dd6e57be78eb31b714e6a07bd72b6cf510284d5e2dd8a273fac1c6c35753555ca9a9ee346c755179e39b7f64d2f11b1f9a724811631f1c66c7b5d383177714e8a14d"}, @NL80211_PKTPAT_PATTERN={0x36, 0x2, "d50d4a42b8e8f456e17be060f6d01246c1042d6ad2d56909596d2faeee1c7ccc3d79e9bbdb0df7961828c295955bec6deaf3"}]}]}, @NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_NET_DETECT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x10, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x8, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x45ac}, 0x1, 0x0, 0x0, 0x105}, 0xfe66a9f1231ace8c) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:40:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:58 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x90, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:40:58 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x901, 0x0, 0x0, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x9}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}]}, 0x54}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)={0x1380, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x80}}}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x45, 0xfa, "e3b27d9a28bd67dc0ef51ab11d8150486918f42a01a18883f34e8e7e00337947dbb1b1beaaa11b05a465a6b06acf6036e63abfb29716b89a9cec1c1625bd27e37b"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0xff00}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xf, 0xf9, "0656d1074f7580e0e34a07"}, @NL80211_ATTR_FILS_ERP_RRK={0xe4, 0xfc, "16d79cedf681fb1ab714a78514f6fd109d7716b2c4eee8906b8f2f0c9c909faa29353031aa00a3826a847ce6c93acca4c0fd3c813f3a89e3ab2db85fedc07c0cac51d9fa69fad1bfe2a1dad457879e018451a733bea6c363163b788575ae306bc8146dae90804d1566a980bb5da7dacb0ffee6c751cca0704178eed025482011bde3a3b70a81f7136a01d41197b0a2b9a06e58aba08d1386424258ca0a1315f3269604d259a8bb61f10a663c277cbf852dbb092fc43e169b72b9efbe0a4613efeef1c940d592dffe8ae0feb546cddcdd6f523f47d5b6c670e4b4237615f9d6ee"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x2}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0xfffa}, @NL80211_ATTR_FILS_ERP_RRK={0x57, 0xfc, "adf00364b65e1444bf5e16faa224126af9892e1d7e78265220ef10b1c90a675116295ab7e85be9a4fa96b45d869a1e941f6526f1d8bd2002ac28f3367a94db3326514871c2cd6b01d2708c460d6fff4ddff215"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x9e}], @NL80211_ATTR_IE={0x1d, 0x2a, [@ext_channel_switch={0x3c, 0x4, {0x0, 0x8, 0x1}}, @mesh_id={0x72, 0x6}, @challenge={0x10, 0x1, 0xed}, @supported_rates={0x1, 0x6, [{0x60, 0x1}, {0x21, 0x1}, {0x24}, {0x4, 0x1}, {0x1b}, {0x48, 0x1}]}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x1004, 0xfa, "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"}, @NL80211_ATTR_FILS_ERP_REALM={0xe3, 0xfa, "af1649fca6814123ac13cb0da802e157d1850fdeb554e640e01e5c37760261739f2712a6ce4efcf840dd568bc0993c2215a248174101953a48c98aed5f07bfea810f5557cd9d2c975183257112cb1d836f6e95ec63bc251864d5105ad3688f230daae5b0dfc827645ce5de7d5e4fff397abce8ee8e5ad545f6f62e5b2ce4d41244fa525dfdba484b8158e8d2e55651cbd2a3fae98ba10d4e0589070b02b5fec8f2e7718f080c3273b6f311b862e0b4ceba811d7bfafdafa173082c4b44bcfa6772d843c3970466fa4b377920f592132e3571fd9765efc2b7787a7d6016b647"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xb, 0xf9, "70c48004808a90"}, @NL80211_ATTR_FILS_ERP_RRK={0x75, 0xfc, "90908492fc9e96d964f7f45e6fad1696b1ad95a19a664d522941227ec2391f3c7f3a4a0a17e34348e3f09bd95574351396755a797de0849f59255f79a6f0d7b4d32d500ab9350ed80212eb9007f0f5ee5bf33cebb360de3b359bbd2c20ed33f4af43e83a68ed78099071b51f01fa2a1f65"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xf, 0xf9, "3198e7fa4c6fa0aaccd39a"}]]}, 0x1380}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) ptrace$setopts(0x4206, r5, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r5, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r5, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) [ 606.361591][T16703] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 606.369107][T16709] ptrace attach of "/root/syz-executor.1"[16707] was attempted by "/root/syz-executor.1"[16709] 13:40:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:40:58 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x600000, 0x0) writev(r2, &(0x7f0000000600)=[{&(0x7f0000000180)="880252c66f96d7d5992331413afb3caf9e854c5adc6f52b60eba741abc6c2a544c68ffa36078924bc4941de4917bf1ff607d20ae2b614e355e2fba5cc20c85cdb7a119768e94f7f1ce20bfad462d8f5a9ad4a949eaaaa3bf77d668b233a5f2bc1920b7f80c25daa192a7068be2346defc7d1a0d1759ed4b382d985d31399415b7e8c65a172c1dccc51f09710c29e39fd8c25a6a8c72aaba560ebe2638a5aef9ddb36362f9b31840be77cb886b293520cf0860908d4b937b8c356963f3834f95a99738246781bcf9341b626393147eec77d96ef39fd6f0f8dddf67893324781d8144d", 0xe2}, {&(0x7f0000000280)="3bdce3e99dc4b381e82b22ab9e8ac522a7b25b8e1200d1a1bf6809a9d1fbe3c205dc9a5720384b7d12d71c5c45ea4155c96c1dcb90518d6d1fd04ff498d8aa5796b79e3867a346ff12bdf627ef63e92e0186e1504d9c29e74679b9f147eeb0b73893c1ec514173bfa2c1548739bf95718c439964d74d0bf20228f7cd73176de1ef119e0baf4f89a7c5b821f28a1d4e5efce792190c2566a2987c540b3026ee766c0e983387590f64a21987931efef632f654d86ae7c9fb08b7fca8aba2bc57565ccb460b", 0xc4}, {&(0x7f0000000380)="a5acd8b1d7fb73b56ae63b9c", 0xc}, {&(0x7f00000003c0)="9c764d6ca8812599a07d2f33b59947f5f06497ad9f4b71275573c92589c94f8e294b1cd8f5b873844b2d3a5bc3eebc31ad2ff073a2c6474277c8ac7544d061a7542436072c1cd5bdef169b8aea9696d3326a89b9b478497bc8b65d07b46b0591e6fc2279cbc47e0059bba85e980c7164914f5bb10fc2218f765aa32dd13d79d6c0549e4eedeb00ae4e75722bc2d1c71cf202cce3a0cf252b2b65ed33ce1bb970044ba2854956d9002e2c4961dcbc961887072eb1c67c1acdf3dc34a520587fc90cf5d21905", 0xc5}, {&(0x7f0000000500)="7ec6f147ac2736f0b6e19397ddd12bde5250c4a26cc7eee41b1cea70d129ac958c8a29e822f92a950f299811967d", 0x2e}, {&(0x7f0000000540)="02f91c431c746070b29869f1d18ef480db4587cd44f5b5a7d0e33d347921f70f3e52e2b68e1e1b088aa5f22c2cb0139a1650957779606051c7851a641b5e1b4c75d9dfbbaed120bc071e8e4fd9fc77dea94db85cc189e859e77743f8b226dd92a94e534e402dd50b6663e35328fa90f4e386f1486a923ec32eeae9f761b4b8fdc8cb363c8f840497d8d134c65c8aa654b13787176f012d57a87fc0f98b76c5d1f627cdb9d4d299", 0xa7}], 0x6) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) 13:40:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0xa0}}, 0x0) [ 606.437576][T16714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:40:58 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x91, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 606.518572][T16723] ptrace attach of "/root/syz-executor.1"[16721] was attempted by "/root/syz-executor.1"[16723] 13:40:58 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000180)=""/109, 0x6d}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f00000002c0)=""/125, 0x7d}, {&(0x7f0000000340)=""/85, 0x55}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/222, 0xde}, {&(0x7f0000001500)=""/197, 0xc5}, {&(0x7f0000001600)=""/179, 0xb3}], 0x8, &(0x7f0000003c80)=[{&(0x7f0000001740)=""/219, 0xdb}, {&(0x7f0000001840)=""/76, 0x4c}, {&(0x7f00000018c0)=""/249, 0xf9}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f00000039c0)=""/192, 0xc0}, {&(0x7f0000003a80)=""/138, 0x8a}, {&(0x7f0000003b40)=""/143, 0x8f}, {&(0x7f0000003c00)=""/98, 0x62}], 0x9, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:40:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 606.609136][T16729] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 606.663647][T16736] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 606.664321][T16737] ptrace attach of "/root/syz-executor.1"[16733] was attempted by "/root/syz-executor.1"[16737] 13:41:01 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0xa0}}, 0x0) 13:41:01 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000002a00)) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000027c0)=[{{&(0x7f0000000180)=@l2tp6, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/194, 0xc2}, {&(0x7f0000000040)=""/20, 0x14}, {&(0x7f0000000300)=""/242, 0xf2}, {&(0x7f0000000400)=""/7, 0x7}, {&(0x7f0000000500)=""/185, 0xb9}], 0x5, &(0x7f00000005c0)=""/220, 0xdc}, 0xffff}, {{&(0x7f00000006c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000740)=""/16, 0x10}, {&(0x7f0000000780)=""/77, 0x4d}, {&(0x7f0000000800)=""/61, 0x3d}, {&(0x7f0000000840)=""/127, 0x7f}], 0x4, &(0x7f0000000900)=""/134, 0x86}, 0x9}, {{&(0x7f00000009c0)=@llc, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/195, 0xc3}, {&(0x7f0000000b40)=""/7, 0x7}], 0x2, &(0x7f0000000bc0)=""/169, 0xa9}}, {{&(0x7f0000000c80)=@qipcrtr, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000d00)=""/74, 0x4a}, {&(0x7f0000000d80)=""/226, 0xe2}, {&(0x7f0000000e80)=""/233, 0xe9}, {&(0x7f0000000f80)=""/134, 0x86}, {&(0x7f0000001040)=""/167, 0xa7}, {&(0x7f0000001100)=""/196, 0xc4}, {&(0x7f0000001200)=""/198, 0xc6}, {&(0x7f0000001300)=""/221, 0xdd}, {&(0x7f0000001400)=""/150, 0x96}], 0x9, &(0x7f0000001580)=""/163, 0xa3}, 0x6}, {{&(0x7f0000001640)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000016c0)=""/137, 0x89}, {&(0x7f0000001780)=""/224, 0xe0}, {&(0x7f0000001880)=""/230, 0xe6}, {&(0x7f0000001980)=""/55, 0x37}], 0x4, &(0x7f0000001a00)=""/248, 0xf8}, 0x2}, {{&(0x7f0000001b00)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b80)=""/27, 0x1b}, {&(0x7f0000001bc0)=""/120, 0x78}], 0x2, &(0x7f0000001c80)=""/141, 0x8d}, 0x71}, {{&(0x7f0000001d40)=@qipcrtr, 0x80, &(0x7f00000022c0)=[{&(0x7f0000001dc0)=""/4, 0x4}, {&(0x7f0000001e00)=""/107, 0x6b}, {&(0x7f0000001e80)=""/215, 0xd7}, {&(0x7f0000001f80)=""/191, 0xbf}, {&(0x7f0000002040)=""/246, 0xf6}, {&(0x7f0000002140)=""/127, 0x7f}, {&(0x7f00000021c0)=""/16, 0x10}, {&(0x7f0000002200)=""/131, 0x83}], 0x8, &(0x7f0000002340)=""/214, 0xd6}, 0x4}, {{&(0x7f0000002440)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, 0x80, &(0x7f0000002700)=[{&(0x7f00000024c0)=""/203, 0xcb}, {&(0x7f00000025c0)=""/184, 0xb8}, {&(0x7f0000002680)=""/87, 0x57}], 0x3, &(0x7f0000002740)=""/103, 0x67}, 0x1000}], 0x8, 0x40000000, &(0x7f00000029c0)={0x77359400}) 13:41:01 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x92, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:01 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:01 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x1) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 609.438042][T16754] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 609.452995][T16757] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:01 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x93, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:01 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) readv(r2, &(0x7f0000000440)=[{&(0x7f0000000180)=""/175, 0xaf}, {&(0x7f0000000240)=""/93, 0x5d}, {&(0x7f00000002c0)=""/76, 0x4c}, {&(0x7f0000000040)=""/48, 0x30}, {&(0x7f0000000340)=""/254, 0xfe}, {&(0x7f0000000500)=""/214, 0xd6}, {&(0x7f0000000600)=""/163, 0xa3}], 0x7) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 609.498810][T16764] ptrace attach of "/root/syz-executor.5"[16755] was attempted by "/root/syz-executor.5"[16764] 13:41:01 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f00000001c0)=0x7) wait4(0x0, 0x0, 0x4000000a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r6, @ANYBLOB="14002c8008000000990900000866"], 0x30}}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$setopts(0x4206, r7, 0x1, 0x2) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:01 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={0x0, 0xa0}}, 0x0) 13:41:01 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:01 executing program 5: r0 = gettid() clone3(&(0x7f0000000400)={0x8000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000340)=0x0, {0x38}, &(0x7f0000000380)=""/35, 0x23, &(0x7f0000000500)=""/4096, &(0x7f00000003c0)=[r0, r0], 0x2}, 0x58) r2 = socket$nl_crypto(0x10, 0x3, 0x15) kcmp(r0, r1, 0x4, r2, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) ptrace$cont(0x9, 0x0, 0x0, 0x8) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000001500)=ANY=[@ANYBLOB="60000000031400042cbd7000fddbdf250900020073797a32000000000800410073697700140033e2179b4c65727370616e300000000000000900020073797a310000000008004100736977ea1300330076657468305f746f5f6261746164760006356adeecd53ffbb60362405e89a2923a927bbea1a5aa77c1f154fefa0957c43351637be2da9897b0df6a3accf1f3826bc74c492b679165ebfd26515f2844eb5298840cd90dd3ef2b4716ed687f0ce163f73d8f0ec5b416341facbdac8306bf0eaeed42641b7f97af033fc716f77ef85940aeecdb1413"], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x20048004) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) [ 609.623059][T16770] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 609.680735][T16784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 609.693608][T16783] ptrace attach of "/root/syz-executor.1"[16778] was attempted by "/root/syz-executor.1"[16783] 13:41:04 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:04 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[], 0xa0}}, 0x0) 13:41:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x94, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:04 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000040)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 612.512446][T16806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:04 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001480)=ANY=[@ANYBLOB="4c150000", @ANYRES16=r3, @ANYBLOB="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"], 0x154c}}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r4, 0x300, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x14, 0x19, {0x5fb, 0xb2a, 0x2, 0x80}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x800) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 612.561448][T16813] ptrace attach of "/root/syz-executor.1"[16810] was attempted by "/root/syz-executor.1"[16813] [ 612.575077][T16814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:04 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[], 0xa0}}, 0x0) 13:41:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x95, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 612.711055][T16825] ptrace attach of "/root/syz-executor.1"[16822] was attempted by "/root/syz-executor.1"[16825] 13:41:04 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:04 executing program 5: sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x4000010) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ioctl$SNDCTL_SEQ_RESET(0xffffffffffffffff, 0x5100) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x3, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:04 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[], 0xa0}}, 0x0) [ 612.797846][T16831] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 612.838823][T16836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:07 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x96, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:07 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x100, 0x8001) 13:41:07 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:07 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xa0}}, 0x0) [ 615.630884][T16858] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 615.669078][T16864] ptrace attach of "/root/syz-executor.1"[16861] was attempted by "/root/syz-executor.1"[16864] 13:41:07 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xa0}}, 0x0) 13:41:07 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x64) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x1, 0x0) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000240)=""/210) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$sndseq(r4, &(0x7f0000000140)=[{0x0, 0x8, 0x6d, 0x1, @tick, {0x9, 0xab}, {0x9, 0x6}, @note={0x2, 0x49, 0x5, 0x9}}, {0xd5, 0x40, 0x20, 0x2, @time={0xffff7fff, 0x81}, {0x2, 0x4}, {0x3, 0x1}, @connect={{0x2e, 0x90}, {0x7f, 0x9}}}, {0x0, 0xad, 0x81, 0x4, @tick=0x2, {0x7f, 0xc0}, {0x2, 0x3}, @control={0x6, 0x1b, 0x81}}, {0x1, 0xf8, 0x28, 0x7, @time={0x7ff, 0x86}, {0x1, 0x3}, {0x1, 0x7}, @raw32={[0x7, 0x401, 0x9]}}, {0x2, 0x40, 0x0, 0x7f, @time={0x8, 0x55cd}, {0x3f, 0x1f}, {0x1, 0xfe}, @queue={0x7, {0xa, 0x7d}}}, {0x7f, 0x9, 0x9, 0x5, @time={0x3f, 0x12a9}, {0x4, 0x2}, {0x4, 0x7}, @result={0x9, 0x1}}, {0x97, 0x5, 0xc0, 0x0, @time={0x0, 0xfd}, {0x3f, 0x5}, {0x70}, @control={0x9, 0x20, 0x3f}}, {0x6, 0x9, 0x7f, 0x61, @time={0x1, 0x4eaccfb9}, {0x80, 0x9}, {0x0, 0x4}, @time=@tick=0x6}], 0xe0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x7, 0x10, 0x2, 0x3, {{0x32, 0x4, 0x1, 0x7, 0xc8, 0x64, 0x0, 0x80, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0xf, 0xffffffffffffffff, [{0x0, 0x9, "a3090e6e89399e"}]}, @cipso={0x86, 0x21, 0x0, [{0x7, 0x5, "73d4cb"}, {0x2, 0x10, "1831cc4ac4e1276727f8d47d74e0"}, {0x5, 0x6, "4734f303"}]}, @ra={0x94, 0x4, 0x1}, @end, @generic={0x88, 0x4, 'Xo'}, @cipso={0x86, 0x37, 0x3, [{0x7, 0x9, "e31eacc9cd583e"}, {0x5, 0xc, "385f9dbc49649a0911df"}, {0x2, 0xd, "01544d3477a33149172bdd"}, {0x7, 0xf, "19e2c603efffa4a1698511ce5c"}]}, @cipso={0x86, 0x16, 0x3, [{0x6, 0x3, "c4"}, {0x2, 0x3, "c4"}, {0x0, 0x7, "98a9c31bb1"}, {0x2, 0x3, "82"}]}, @generic={0x89, 0x9, "30c7f346544f9a"}, @timestamp_prespec={0x44, 0x24, 0x8c, 0x3, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1ff}, {@empty, 0x6}, {@empty, 0x5}, {@multicast1, 0xcb3}]}]}}}}}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 615.679364][T16866] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:07 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x97, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:07 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:07 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setopts(0x4200, r2, 0x0, 0x93) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:07 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB], 0xa0}}, 0x0) 13:41:07 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 615.854639][T16877] ptrace attach of "/root/syz-executor.1"[16875] was attempted by "/root/syz-executor.1"[16877] [ 615.887388][T16880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:07 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f0000000340)={0xa, 0x20, [{0x6, 0x0, 0x7}, {0x3, 0x0, 0x3}, {0x8, 0x0, 0x80}, {0x8, 0x0, 0x1}, {0xe6a, 0x0, 0x8}, {0x4, 0x0, 0x10000}, {0xea, 0x0, 0x1ff}, {0x1, 0x0, 0x3}, {0xfff, 0x0, 0x3f}, {0x0, 0x0, 0x6c88}]}) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) timer_create(0x7, &(0x7f0000000280)={0x0, 0x20, 0x4, @thr={&(0x7f0000000180)="1e2f351c372c7f99d9a0d1e42ea178e631a94e5fbf60c413e1dba0add0afc639705110893bf7aa3b18d91f308593d99ceec4b5dad48e1ca71b4c0d7a098d33e11e494c8b9e51638eaf1388183d1565f087516f0fe8ac223192dcca912a418162af95dd4b4988c590baf182f6022beed3ed54ed5e7f862e2d791f2c997cdb70eb028c60588f5152ba482ce980678003990d7982ec8d8a1dc061c721dd681c8a83978a3e19884f79b70224f8cad1d8074d01d5991a3797e474ee9fc17c3ebfcd7eb89cbc5ac439d7d44633df183c5e9bf304", &(0x7f0000000040)}}, &(0x7f00000002c0)=0x0) timer_gettime(r2, &(0x7f0000000300)) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 615.969432][T16885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 616.085690][T16894] ptrace attach of "/root/syz-executor.1"[16892] was attempted by "/root/syz-executor.1"[16894] 13:41:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x7, 0x5}}, 0x30) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:41:10 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a0000000000000000000000000000002000000000000000000000000000000008001200000002000000000000"], 0xa0}}, 0x0) 13:41:10 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x98, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:10 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:10 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$usbmon(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8e961dc1e7eddb1f, 0x40010, r2, 0x7) 13:41:10 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020}, 0x2020) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 618.698484][T16912] ptrace attach of "/root/syz-executor.5"[16908] was attempted by "/root/syz-executor.5"[16912] [ 618.704806][T16915] ptrace attach of "/root/syz-executor.1"[16909] was attempted by "/root/syz-executor.1"[16915] [ 618.736179][T16913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:10 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:10 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a0000000000000000000000000000002000000000000000000000000000000008001200000002000000000000"], 0xa0}}, 0x0) [ 618.784823][T16919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:10 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0xa000800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0xb0, r2, 0x0, 0x0, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfd91}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2}}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x42}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa210101}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0xb0}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000340)={0x14, r2, 0x10, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f00000002c0)={0x1, 0xfffa, 0x2}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x480200, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:10 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x99, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:10 executing program 1: gettid() r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x5, 0xfffffffe}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r2}, 0x8) r3 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r3) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000200)={0x2, 0x0, 0x800, 0x5, 'syz1\x00', 0xfffffffc}) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ioprio_set$pid(0x1, r4, 0x0) ptrace$cont(0x7, r4, 0x0, 0x0) 13:41:10 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x60}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:10 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x1100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) signalfd4(r1, &(0x7f0000000240)={[0x9]}, 0x8, 0x80000) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000300)=[{&(0x7f00000004c0)="0f34", 0x2}, {&(0x7f0000000340)="55050039f4e5081bef44d8bc200d7086cb7f930700000014276dbc9989b2fa71c6e300000000000000000000a828adb841bbda8472e273242a80247781475acdea2e1c0cd1e945ed1519edd247018db419208213f78103c07e00f02697e180813f140fbe00f668577c6f90b8fd2843d864cee0e6967b080c6276d00a9a0eb20b99dfc91d59ab8a990da18ea4a2c3f88a28762ef59f4606c195e23c5702ed021515d0801bb0af2a886a0000", 0x28}, {&(0x7f00000002c0)='\"x', 0xfffffe03}], 0x3, 0xc) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000640)=ANY=[@ANYBLOB="020ef0ff13000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000700000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39cb8f0e256df39a71c0bb8359f3c0fd30645ca8f041607e19473fe00619b63cb933142744c1ffe8d48f96715f30a4de3280a0b1ea63ff5c117fe43d68fdfb7baa761d63c0c04a8ca095424a03c20db1837ad4e7441d49dd4e7b9bec5dd3d611222f87c0517970a4c271f12fb24e67013ef8ca2ed1f729da2926b77542c7e26254003c4d9085cc812c9528565402cd89c6e668741bc9e76c71a369d4747c830b1c5d03ae6a890ddf05c"], 0xa0}}, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r4, 0x1, 0x53, &(0x7f0000000180)={0x6, 0x7, 'syz1\x00'}, &(0x7f00000001c0)=0x28) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000200)={0x7}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 619.010857][T16935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 619.082166][T16942] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:13 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a0000000000000000000000000000002000000000000000000000000000000008001200000002000000000000"], 0xa0}}, 0x0) 13:41:13 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2b, 0x0, 0x2, 0x0, 0x10, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x700, 0x8, 0x6}}) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x9a, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:13 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0xc) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:13 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x60}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb00"/103], 0xa0}}, 0x0) 13:41:13 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x60}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 621.780426][T16961] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 621.810958][T16966] ptrace attach of "/root/syz-executor.5"[16962] was attempted by "/root/syz-executor.5"[16966] [ 621.838276][T16969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:13 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000500)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001480)=ANY=[@ANYBLOB="4c150000", @ANYRES16=r3, @ANYBLOB="010000000040ffdbdf250100000024000300a05ca84f6c9c8e3853e2fd7a70ae0fb20fa152600cb00845174f08076f8d7843c41408800405008024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd404098070000080060001000200000008000200ffffffff0500030001000000060001000200000008000200000000000500030000000000060001000a00000014000200fe8800000000000000000000000000010500030000000000060001000200000008000200ffffffff050003000300000028000080060001000a00000014000200fc0200000000000000000000000000010500030001000000d0000080060001000200000008000200ac1414bb0500030003000000060001000200000008000200640101000500030000000000060001000200000008000200ac14143c0500030003000000060001000200000008000200e00000020500030000000000060001000a00000014000200ff02000000000000000000000000000105000300030000000600010002000000080002000a01010005000300010000000600010002000000080002007f00000105000300020000000600010002000000080002000000000005000300020000004c000080060001000a00000014000200fc0100000000000000000000000000010500030003000000060001000a00000014000200fe8800000000000000000000000000010500030003000000d0000080060001000200000008000200e00000020500030002000000060001000a00000014000200fe8000000000000000000000000000bb0500030003000000060001000a00000014000200fe80000000000000000000000000002705000300030000000600010002000000080002006401010005000300010000000600010002000000080002006401010205000300000000000600010002000000080002007f0000010500030000000000060001000a00000014000200fc00000000000000000000000000000105000300020000007c000080060001000a00000014000200000000000000000000000000000000000500030002000000060001000a00000014000200fc0100000000000000000000000000000500030003000000060001000200000008000200ac14142105000300020000000600010002000000080002007f0000010500030003000000b8000080060001000a00000014000200fe80000000000000000000000000003905000300020000000600010002000000080002007f0000010500030002000000060001000a00000014000200fc0200000000000000000000000000000500030000000000060001000200000008000200ac1414bb0500030000000000060001000200000008000200000000000500030002000000060001000a00000014000200fc010000000000000000000000000000050003000100000018010080060001000a00000014000200200100000000000000000000000000000500030003000000060001000a00000014000200fc02000000000000000000000000000005000300000000000600010002000000080002000000001f0500030002000000060001000a00000014000200fc0200000000000000000000000000010500030000000000060001000200000008000200e00000020500030000000000060001000200000008000200e00000020500030002000000060001000200000008000200ffffffff0500030003000000060001000200000008000200ac1414300500030002000000060001000200000008000200000000000500030003000000060001000200000008000200ac1414bb050003000000000008000a00010000003000008024000200d26a33d1121c99fcc2107d0bd9f621fc91ce0cde4d42110796d6ac09084bb0ce0800030000000000840100801400040002004e20000000000000000000000000400109803c0100800600010002000000080002000000000005000300020000000600010002000000080002007f0000010500030001000000060001000a00000014000200fc0000000000000000000000000000000500030003000000060001000a00000014000200fe8000000000000000000000000000aa0500030001000000060001000200000008000200640101010500030002000000060001000a00000014000200fe8800000000000000000000000001010500030002000000060001000a0000001400020000400000000000000000ffff0000000005000300010000000600010002000000080002007f0000010500030002000000060001000a00000014000200fe8000000000000000000000000000290500030001000000060001000a00000014000200fe8000000000000000000000000000aa050003000100000024000200dcfd6eb994ba3f07a2e8de641fbca6bb547a6c16e60a0ec91f96f5f52702ca8308000a00010000001c00008008000a0001000000080003000400000008000a00010000002808008024000200c68753e09de0b87d83862bfdef429ca158ddb7ac1fffa5dc22f96b9d2330e590040309801c000080060001000200000008000200ac1414bb0500030003000000b8000080060001000a00000014000200fe8000000000000000000000000000aa0500030001000000060001000200000008000200e00000010500030003000000060001000a00000014000200fe8000000000000000000000000000aa0500030001000000060001000200000008000200ac1e00010500030003000000060001000a00000014000200000000000000000000000000000000000500030003000000060001000200000008000200e00000020500030003000000e8000080060001000200000008000200640101000500030001000000060001000200000008000200ac14143f0500030001000000060001000200000008000200000000000500030003000000060001000200000008000200e00000010500030001000000060001000200000008000200e000000105000300000000000600010002000000080002007f0000010500030000000000060001000200000008000200e000000205000300020000000600010002000000080002000a0101020500030003000000060001000a00000014000200fe8000000000000000000000000000bb050003000100000088000080060001000a00000014000200fe8800000000000000000000000001010500030001000000060001000a00000014000200ff0200000000000000000000000000010500030003000000060001000a00000014000200fe80000000000000000000000000000a0500030001000000060001000200000008000200ac141415050003000200000040000080060001000a00000014000200ff0200000000000000000000000000010500030001000000060001000200000008000200ac1e000105000300010000007c000080060001000200000008000200640101000500030001000000060001000a00000014000200200100000000000000000000000000020500030000000000060001000a00000014000200ff0200000000000000000000000000010500030003000000060001000200000008000200e0000001050003000300000024000100f44da367a88ee6564f020211456727082f5cebee8b1bf5eb7337341b459b3922d8040980a0000080060001000a00000014000200ff0200000000000000000000000000010500030003000000060001000a00000014000200fe8000000000000000000000000000200500030003000000060001000a00000014000200000000000000000000000000000000000500030000000000060001000200000008000200ac1e01010500030001000000060001000200000008000200ac1414aa0500030001000000d00000800600010002000000080002007f0000010500030002000000060001000200000008000200000000000500030003000000060001000a00000014000200fe8000000000000000000000000000bb0500030000000000060001000200000008000200ac1414370500030002000000060001000200000008000200ffffffff0500030003000000060001000a00000014000200fe80000000000000000000000000000e0500030002000000060001000a00000014000200fc0000000000000000000000000000000500030003000000b8000080060001000a00000014000200fe8000000000000000000000000000aa0500030000000000060001000a00000014000200fe8000000000000000000000000000bb0500030001000000060001000a00000014000200fc0100000000000000000000000000000500030000000000060001000a00000014000200fe8800000000000000000000000000010500030002000000060001000a00000014000200fe8000000000000000000000000000aa05000300020000000c010080060001000a00000014000200fc0200000000000000000000000000000500030003000000060001000a00000014000200000000000000000000000000000000000500030002000000060001000a00000014000200000000000000000000000000000000000500030003000000060001000a00000014000200fe8800000000000000000000000001010500030000000000060001000a00000014000200fe8000000000000000000000000000aa0500030003000000060001000200000008000200ac1414bb0500030002000000060001000a00000014000200fe8800000000000000000000000001010500030002000000060001000200000008000200ac1414bb0500030000000000c40000800600010002000000080002007f00000105000300020000000600010002000000080002007f0000010500030002000000060001000a00000014000200fe8000000000000000000000000000bb0500030003000000060001000a00000014000200ff0200000000000000000000000000010500030001000000060001000a00000014000200fe8800000000000000000000000000010500030002000000060001000a00000014000200fc0200000000000000000000000000010500030000000000dc000080060001000a00000014000200fe8000000000000000000000000000aa0500030001000000060001000200000008000200000000000500030000000000060001000a00000014000200fc0100000000000000000000000000010500030000000000060001000200000008000200e00000020500030002000000060001000a00000014000200ff0100000000000000000000000000010500030000000000060001000a000000140002002001000000000000000000000000000105000300000000000600010002000000080002000a0101010500030003000000c4050080c00109807c000080060001000a00000014000200fc0000000000000000000000000000010500030002000000060001000200000008000200ac1414aa0500030002000000060001000a00000014000200ff0100000000000000000000000000010500030001000000060001000200000008000200ffffffff05000300010000004c000080060001000a00000014000200fc0100000000000000000000000000000500030002000000060001000a00000014000200fc0100000000000000000000000000000500030000000000a0000080060001000a0000001400020000000000000000000000ffffac1414bb0500030000000000060001000200000008000200e00000020500030001000000060001000a00000014000200ff0200000000000000000000000000010500030000000000060001000a00000014000200fe88000000000000000000000000000105000300030000000600010002000000080002007f0000010500030001000000340000800600010002000000080002006401010005000300010000000600010002000000080002000000000005000300020000001c000080060001000200000008000200e00000020500030000000000040000807001098070000080060001000200000008000200e00000010500030001000000060001000a00000014000200fc0200000000000000000000000000010500030000000000060001000200000008000200e000000205000300030000000600010002000000080002006401010205000300000000004c000080060001000a0000001400020000000000000000000000ffff7f0000010500030000000000060001000a00000014000200fe8000000000000000000000000000aa05000300020000004c000080060001000a0000001400020000000000000000000000ffffac1414aa0500030003000000060001000a0000001400020000000000000000000000000000000001050003000000000064000080060001000200000008000200ffffffff0500030003000000060001000a00000014000200fe8000000000000000000000000000aa0500030003000000060001000a0000001400020000000000000000000000ffffac1414aa0500030002000000240001000000000000000000000000000000000000000000000000000000000000000000200004000a004e240001000000000000000000000000000000000000f503000008000a000100000044020980c4000080060001000200000008000200e00000010500030002000000060001000200000008000200640101010500030000000000060001000a00000014000200fe8000000000000000000000000000130500030001000000060001000200000008000200ac1e00010500030000000000060001000a00000014000200200100000000000000000000000000020500030003000000060001000200000008000200ac1414aa05000300020000000600010002000000080002007f000001050003000000000088000080060001000200000008000200ac1414bb0500030000000000060001000200000008000200ac1414400500030001000000060001000200000008000200e00000020500030000000000060001000200000008000200e00000010500030003000000060001000a00000014000200fc00000000000000000000000000000105000300000000001c00008006000100020000000800020064010101050003000300000064000080060001000a00000014000200200100000000000000000000000000020500030001000000060001000a00000014000200ff0200000000000000000000000000010500030000000000060001000200000008000200ac1414aa050003000100000040000080060001000a00000014000200200100000000000000000000000000020500030003000000060001000200000008000200e0000001050003000100000034000080060001000200000008000200000000000500030000000000060001000200000008000200ac1414bb05000300000000001400020077673000000000000000000000000000060006004e200000060006004e2100000800050001000000240003"], 0x154c}}, 0x0) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000140)={0x38, 0x0, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x8, 0x7a}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x62}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x67}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x881) tkill(r1, 0x40) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000540)) write$sndseq(0xffffffffffffffff, &(0x7f0000000300)=[{0x7, 0x8, 0x0, 0x8b, @tick=0x862d, {0x1f, 0x5b}, {0x5, 0xe0}, @connect={{0x3f}, {0x2, 0x1}}}, {0x0, 0x80, 0x6, 0xfd, @time={0x0, 0x4ca7369e}, {0x0, 0x4}, {0x56, 0x3f}, @result={0x9, 0x7}}, {0x4, 0x7f, 0x40, 0x1, @time={0x40, 0x1}, {0x0, 0xa9}, {0x1, 0x80}, @quote={{0x1, 0x80}, 0x4}}, {0x5b, 0x0, 0x5, 0x0, @tick=0xfffffffc, {0xff, 0x1f}, {0x6, 0x1f}, @note={0xff, 0x0, 0x7, 0x7, 0x4}}, {0x5a, 0x7, 0x2, 0x2, @time={0xffffffff, 0xffff}, {0x81}, {0x1, 0xc9}, @quote={{0xb, 0x77}, 0x1}}, {0x4, 0x2, 0x81, 0x5, @tick=0x81, {0x8f, 0x5}, {0x8, 0x3}, @raw32={[0x200, 0xfff, 0xdee]}}, {0x9, 0x20, 0x4, 0x40, @time={0x1, 0x9}, {0x1, 0x3}, {0x1, 0x8}, @raw32={[0x4, 0x2, 0x80]}}, {0x9, 0x1, 0x8, 0x85, @time={0x6, 0x7}, {0xc1, 0x7f}, {0x5, 0x3}, @connect={{0x9, 0x9}, {0x0, 0x4}}}, {0x1, 0x3f, 0x5, 0x1, @tick=0x2, {0x1}, {0x20, 0x7}, @queue={0xff, {0x5, 0x80}}}, {0x40, 0x0, 0x3f, 0x4, @tick=0x6d07, {0x1, 0x81}, {0x83, 0x7}, @connect={{0x0, 0x7}, {0x81, 0x2}}}], 0x118) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) clone(0x4000000, &(0x7f0000000180)="5a1a5cba7a47b5872364912d63bbb4f1b3238d0a7411c37d18bee2da32c56fa245b1286c69cb2cc0a08f713f9fa6a52d2938ff3c49750e77ed6a86c503303e25e1541f5c884f295b5b260cf7ac90695b73fb0317abc4e99bde12d65ee90b4f407e5aeff0f2286c0389c228559c45a76032108b6945a097b1e9898472e6ec", &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000240)="9bc8d7e1105740fd6eb31ba88a08d62b3beff1dd69078b156b1b735014d3a4bf0f96b7181847fc4d2182d8f18c4ebfb54d564e86558b6b2b946e598bae54342ec18cc88aa81ba90bde407d8fdbcbc13ee8e9f99434dd5c7310c69e4a3b31c093dd24c22cdaec5ca16c01f2ee0fb45ab27473a1db0f10741ce18224b5fe39eb1af15a69d2c3e08891a81fd8bd2f2e84a2c6af") ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x9b, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:13 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb00"/103], 0xa0}}, 0x0) 13:41:13 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 622.055999][T16986] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 622.089276][T16991] ptrace attach of "/root/syz-executor.5"[16985] was attempted by "/root/syz-executor.5"[16991] [ 622.138122][T16992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:16 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb00"/103], 0xa0}}, 0x0) 13:41:16 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:16 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)={0x14, 0x3, 0x2, 0x3}, 0x14}}, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:41:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x9c, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:16 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 624.891119][T17010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 624.910368][T17014] ptrace attach of "/root/syz-executor.1"[17011] was attempted by "/root/syz-executor.1"[17014] [ 624.923168][T17015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x9d, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac141400"/120], 0xa0}}, 0x0) 13:41:16 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 625.098237][T17028] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:16 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x78}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 625.149916][T17033] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:16 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac141400"/120], 0xa0}}, 0x0) 13:41:17 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x9e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 625.379688][T17041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 625.418624][T17042] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac141400"/120], 0xa0}}, 0x0) 13:41:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:19 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x9f, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:19 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x78}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:19 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000600)={{}, 0x0, 0x1c, @unused=[0x719, 0x9d0d, 0x0, 0x401], @devid=r2}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000500)={0x4, 0x2, {0x2, @usage=0x3, 0x0, 0x7, 0x5, 0x5, 0x7, 0x4, 0x5c, @struct={0x1ff, 0x400}, 0x85, 0x8000, [0x3, 0x7f, 0x0, 0x0, 0xffffffff, 0xa5b2]}, {0x1, @usage=0x9b3f, r2, 0xfffffffffffffffe, 0x7f, 0x9, 0x8, 0x80000001, 0x28, @struct={0x10000, 0x602}, 0x489, 0x39, [0x9, 0xa4, 0xfffffffffffffffc, 0x80000000, 0xfffffffffffffffd, 0x3ff]}, {0x7fff, @struct={0x7, 0x8}, 0x0, 0x1, 0x5, 0x7, 0x952, 0x8, 0x3, @usage=0x6, 0x100, 0x0, [0x9, 0x8, 0x5, 0x101, 0x3, 0x8]}, {0x50000000000000, 0x47, 0x9}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIMINTERFACE(r4, 0x8004550f, &(0x7f0000000040)=0x401) 13:41:19 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x1000000000002, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x311080, 0x0) sendmsg$IPSET_CMD_HEADER(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0xc, 0x6, 0x500, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x890) write$6lowpan_enable(r2, &(0x7f0000000180)='1', 0x1) sendmsg$IPSET_CMD_ADD(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c000000090601010000000000000000020000071c0008800c00078005001500000000000c00078008fefa25aa0000030900020073797a3200000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8008884}, 0x18) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:19 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001480)=ANY=[@ANYBLOB="4c150000", @ANYRES16=r3, @ANYBLOB="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"], 0x154c}}, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(r2, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000440)={&(0x7f0000000180)={0x2a4, 0x0, 0x10, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xbc8a, 0x23}}}}, [@NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x1}, @NL80211_ATTR_TDLS_ACTION={0x5, 0x88, 0x8}, @NL80211_ATTR_IE={0xb7, 0x2a, [@preq={0x82, 0x25, @not_ext={{0x1, 0x0, 0x1}, 0x1, 0x0, 0xe3, @broadcast, 0x7, "", 0xffff9ac0, 0x7, 0x1, [{{0x1}, @broadcast, 0x4241}]}}, @mic={0x8c, 0x18, {0x484, "7cef92d4ce23", @long="03714ac0076c3cfaa4715b0703b7c420"}}, @challenge={0x10, 0x1, 0xb}, @ht={0x2d, 0x1a, {0x8, 0x3, 0x7, 0x0, {0xfffffffffffffffd, 0x1, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x800, 0x9}}, @ht={0x2d, 0x1a, {0x2000, 0x1, 0x2, 0x0, {0x1, 0x7, 0x0, 0x3f, 0x0, 0x0, 0x1, 0x1}, 0x800, 0x9, 0xfe}}, @link_id={0x65, 0x12, {@from_mac, @device_a, @broadcast}}, @ibss={0x6, 0x2, 0xff73}, @tim={0x5, 0x1d, {0x1, 0x98, 0x2, "f7a5fd1ba62d1ee3678bfff513796f084837344a0a056202754c"}}]}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x9}, @NL80211_ATTR_IE={0x64, 0x2a, [@sec_chan_ofs={0x3e, 0x1, 0x1}, @random={0xad, 0x55, "b167b601dc5add1d7a95bcf822355251872f2e9fd1bb92c41b40585c377208dd9e36218c3452841d733660c2b22cd5892a47c529db6489a24acc292a5bcb08836fda6f33a82b1ee5bdf9dbca5b9eaba7b129eaf595"}, @chsw_timing={0x68, 0x4, {0x3, 0x1000}}]}, @NL80211_ATTR_IE={0x147, 0x2a, [@link_id={0x65, 0x12, {@random="2f4419fb5e21", @device_b, @device_b}}, @sec_chan_ofs={0x3e, 0x1}, @mesh_id={0x72, 0x6}, @random_vendor={0xdd, 0xe2, "62842bc8b3a444894f52aed3260d6d3e6b8c35549dcfa7ed4358134ff7cb673f7bba154b4a5ccbc377d055f77647e6161e021a64271715bf1d324bcd16f0091eb648200d6282e15ced9484e3c6da07186ade18c0e91ba4f7a216aa5e4598be67527a982f7fb3a7c6bc5597b01ca18c0baca580fe1f283656337ba938a684ab7affd14ab297f5e06406b2db4e9b4094eb3fd1da55b4a3eeef83a0c7ab399851d4db9c3ae0fbe255087a022be991508bfe9c38d0d8ab4035ef26f297815004ca3ddac89a2524900f87c7ce9cb7d30b3a34fa718d0128340c2590906866ade15a9daeba"}, @chsw_timing={0x68, 0x4, {0x8, 0xf2}}, @link_id={0x65, 0x12, {@from_mac, @device_b, @device_b}}, @ht={0x2d, 0x1a, {0x2, 0x2, 0x0, 0x0, {0x3, 0x8, 0x0, 0x8, 0x0, 0x1, 0x0, 0x3, 0x1}, 0x8, 0x20, 0x67}}, @peer_mgmt={0x75, 0x8, {0x0, 0x800, @val=0x8c07, @val=0x14, @void}}]}, @NL80211_ATTR_TDLS_PEER_CAPABILITY={0x8, 0xcb, 0x2}]}, 0x2a4}, 0x1, 0x0, 0x0, 0x80c0}, 0x40) [ 627.969590][T17058] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:19 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000026c0)=[{&(0x7f0000000140)=""/203, 0xcb}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000240)=""/104, 0x68}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000000340)=""/69, 0x45}, {&(0x7f00000003c0)=""/199, 0xc7}, {&(0x7f00000000c0)=""/5, 0x5}, {&(0x7f0000002500)=""/218, 0xda}, {&(0x7f0000002600)=""/145, 0x91}], 0xa, &(0x7f0000002800)=[{&(0x7f0000002780)=""/70, 0x46}], 0x1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0xffc8) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:19 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0x78}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:19 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a"], 0xa0}}, 0x0) [ 628.054571][T17069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 628.138271][T17076] ptrace attach of "/root/syz-executor.5"[17072] was attempted by "/root/syz-executor.5"[17076] 13:41:19 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0x113000, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r1, 0x500e, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x20, 0x0, 0x0, @tick=0x6, {0x0, 0x1}, {}, @raw32={[0x800, 0x8, 0x8]}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000140)=""/162) ptrace$cont(0x7, r2, 0x0, 0x0) 13:41:19 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 628.194696][T17086] ptrace attach of "/root/syz-executor.1"[17082] was attempted by "/root/syz-executor.1"[17086] 13:41:20 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) [ 628.305885][T17090] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 628.341336][T17097] ptrace attach of "/root/syz-executor.5"[17091] was attempted by "/root/syz-executor.5"[17097] [ 628.341850][T17095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a"], 0xa0}}, 0x0) 13:41:22 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000040)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:22 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80014580, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x18680, 0x0) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:22 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:22 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa1, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:22 executing program 5: mmap$snddsp_control(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0x0, 0x80010, 0xffffffffffffffff, 0x83000000) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000040)={0x2c, @multicast2, 0x4e20, 0x3, 'ovf\x00', 0x10, 0x5, 0x2c}, 0x2c) [ 631.067876][T17114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 631.095736][T17119] ptrace attach of "/root/syz-executor.1"[17115] was attempted by "/root/syz-executor.1"[17119] 13:41:22 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:22 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'security.', '{\x00'}, &(0x7f0000000200)=""/122, 0x7a) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:22 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a"], 0xa0}}, 0x0) [ 631.136561][T17121] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 631.225074][T17125] IPVS: set_ctl: invalid protocol: 44 224.0.0.2:20000 13:41:23 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940"], 0xa0}}, 0x0) [ 631.313533][T17125] IPVS: set_ctl: invalid protocol: 44 224.0.0.2:20000 [ 631.330662][T17139] ptrace attach of "/root/syz-executor.1"[17136] was attempted by "/root/syz-executor.1"[17139] [ 631.381296][T17141] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 631.442381][T17145] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:25 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYRESDEC=r2, @ANYRES16, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="800000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000080000000b000100666c6f7765720000500002004c000300480001000b0001"], 0x80}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r4) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:25 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:25 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940"], 0xa0}}, 0x0) 13:41:25 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x1100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) signalfd4(r1, &(0x7f0000000240)={[0x9]}, 0x8, 0x80000) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000300)=[{&(0x7f00000004c0)="0f34", 0x2}, {&(0x7f0000000340)="55050039f4e5081bef44d8bc200d7086cb7f930700000014276dbc9989b2fa71c6e300000000000000000000a828adb841bbda8472e273242a80247781475acdea2e1c0cd1e945ed1519edd247018db419208213f78103c07e00f02697e180813f140fbe00f668577c6f90b8fd2843d864cee0e6967b080c6276d00a9a0eb20b99dfc91d59ab8a990da18ea4a2c3f88a28762ef59f4606c195e23c5702ed021515d0801bb0af2a886a0000", 0x28}, {&(0x7f00000002c0)='\"x', 0xfffffe03}], 0x3, 0xc) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0xa0}}, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r4, 0x1, 0x53, &(0x7f0000000180)={0x6, 0x7, 'syz1\x00'}, &(0x7f00000001c0)=0x28) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000200)={0x7}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:41:25 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa3, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940"], 0xa0}}, 0x0) [ 634.168586][T17163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 634.199705][T17167] ptrace attach of "/root/syz-executor.1"[17164] was attempted by "/root/syz-executor.1"[17167] 13:41:26 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r2, &(0x7f0000000500)={0x2020}, 0x2020) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:26 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x100, 0x8001) 13:41:26 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = gettid() tkill(r2, 0x37) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 634.249007][T17169] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:26 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)="0f34", 0x2}], 0x1, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6effffffffc971b766e9c49318153df96ff8128797c7ca71f24e7c3bec3d527815b802114abca1a166569bbacc9fd504a755b7d3f4725cbd26d8ab51eda5e2e0c1fe480bc511706b02e1f237d4c8b4ffe3ef7435cf791179f346470723bfe255629cac860c07a978471c623ab7a5918e16a991ba8c33f358b3511124c323821df3e812fd8b4a84c2e2007cc927e58a04c873106712ce7892b45d01bc55727d030978e7af80499ef0a1983e82b34818fc89a8", @ANYRESHEX=r2, @ANYBLOB="2c726f5b746d6f6409c3e293f67782c22b8c653d3030301030303030303030303030303034303030302c759265725f69643d0000", @ANYRESDEC=0x0, @ANYBLOB="2c67726f81ea36d3643d0000000000000000000000001000dfd015bae9a9852ef470b0111ae55cc61415d0039357c8a8d888707d80682f0d4c700cbd78377ad7a24b3263e971e99c226eab5b9b9f4a5415391ea3e1f1959826a443e637e0ac8b35b7d14add887808d18ce8d521bbb4007b788fd83d56b7f25fda12b3cbd4fb64cc626079bda90bf92db3dccf7bb5fa824ac84795cd665de982f8ae2798d54f4779ea35a132e01f69ccbdd8cfd2aa7eda127c245a860bc170d94c12", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r2, &(0x7f0000004280)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000004200)={0x50, 0x0, r3}, 0x50) syz_fuse_handle_req(r2, &(0x7f00000066c0)="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", 0x60a, &(0x7f0000008b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x90, 0xfffffffffffffff5, 0x0, {0x4, 0x0, 0x0, 0x0, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r2, &(0x7f000000ec00)={0x2020, 0x0, 0x0}, 0x205c) write$FUSE_LK(r2, &(0x7f0000000080)={0x28, 0x0, r4}, 0x28) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r4, {0x3}}, 0x18) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0xffffffff, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:26 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa4, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:26 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308c"], 0xa0}}, 0x0) [ 634.414895][T17187] ptrace attach of "/root/syz-executor.5"[17183] was attempted by "/root/syz-executor.5"[17187] [ 634.444565][T17192] ptrace attach of "/root/syz-executor.1"[17189] was attempted by "/root/syz-executor.1"[17192] 13:41:26 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) tee(r2, 0xffffffffffffffff, 0x6, 0x1) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000040)=0x1000, 0x4) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 634.472094][T17195] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 634.494970][T17197] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 634.597918][T17204] ptrace attach of "/root/syz-executor.1"[17202] was attempted by "/root/syz-executor.1"[17204] 13:41:28 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:28 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_PS_STATE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000414}, 0x20000040) 13:41:28 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa5, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:28 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308c"], 0xa0}}, 0x0) 13:41:28 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/215, 0xd7}, {&(0x7f0000000000)=""/66, 0x42}, {&(0x7f0000000280)=""/98, 0x62}, {&(0x7f0000000300)=""/98, 0x62}, {&(0x7f0000000080)=""/63, 0x3f}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000380)=""/193, 0xc1}, {&(0x7f0000001500)=""/104, 0x68}, {&(0x7f0000000480)=""/8, 0x8}, {&(0x7f0000001580)=""/21, 0x15}], 0xa, 0x0, 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$getregset(0x4204, r2, 0x2, &(0x7f00000016c0)={&(0x7f0000001680)=""/56, 0x38}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 637.203356][T17217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:29 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 637.249044][T17224] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 637.276382][T17226] ptrace attach of "/root/syz-executor.5"[17222] was attempted by "/root/syz-executor.5"[17226] 13:41:29 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x100, 0x8001) 13:41:29 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308c"], 0xa0}}, 0x0) 13:41:29 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0ff6", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 637.370605][T17231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 637.398348][T17234] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 637.408945][T17238] ptrace attach of "/root/syz-executor.1"[17233] was attempted by "/root/syz-executor.1"[17238] 13:41:29 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000500)={0x1010, 0x453, 0x1, 0x70bd26, 0x25dfdbfe, "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", ["", "", "", ""]}, 0x1010}, 0x1, 0x0, 0x0, 0x4000}, 0x10) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) get_robust_list(r2, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f0000000240), 0x0, &(0x7f0000000280)}, &(0x7f0000000340)=0x18) 13:41:29 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa7, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 637.533718][T17249] ptrace attach of "/root/syz-executor.5"[17246] was attempted by "/root/syz-executor.5"[17249] [ 637.576129][T17256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 637.589737][T17258] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:32 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca3"], 0xa0}}, 0x0) 13:41:32 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0xcaf, 0x61e0) 13:41:32 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa8, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca3"], 0xa0}}, 0x0) 13:41:32 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) [ 640.283782][T17271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 640.310529][T17275] ptrace attach of "/root/syz-executor.5"[17272] was attempted by "/root/syz-executor.5"[17275] [ 640.353328][T17279] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:32 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x100, 0x8001) 13:41:32 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xa9, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:32 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0xd) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:32 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x80, 0x0, 0x0, @time, {}, {}, @queue={0xfb, {0x10000, 0x40}}}], 0x1c) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x4, &(0x7f0000000200)="f20384c4c2626d6b081cd6e474aab6c5a4aef09d26feee8040ea74de6a3e698cd46326d2e101df6fb71c6232394b3626461088a805249f44c8fe99dab889c0283bfd533d1c7964eb2be2e5caebbccdd51cb3027785f70215198c222601e9418cf9fd078d32e5c038583b80e9417c43d343d6e2a74617f4a6e34277c726c15cadb016315be2b870acfe2cb4efab9e08ff8555ba9f2c5ff712079bf2c7e0418c5ecfedaa711ca80716c3c33bd56ce2a9e062c06a5dbbf23c37b803bc1e9ff27a") ptrace$cont(0x7, r1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) clone3(&(0x7f00000003c0)={0x280000000, &(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0), {0xe}, &(0x7f0000000440)=""/231, 0xe7, &(0x7f0000000300)=""/65, &(0x7f0000000040)=[r0, r0, r1], 0x3}, 0xffffffc3) ptrace(0x8, r3) 13:41:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca3"], 0xa0}}, 0x0) [ 640.540468][T17291] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 640.577100][T17295] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 640.630515][T17303] ptrace attach of "/root/syz-executor.1"[17299] was attempted by "/root/syz-executor.1"[17303] 13:41:32 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xaa, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:35 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:35 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x8, 0x8, 0x25dfdbfb, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x80) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000001c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl1\x00', r2, 0x29, 0x4, 0x7f, 0xffffffe3, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x3d}, 0x10, 0x700, 0x80000001, 0x1}}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x7, 0x2) 13:41:35 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) sched_getaffinity(r2, 0x8, &(0x7f0000000180)) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x840) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x8001, &(0x7f00000001c0)=""/223) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:35 executing program 4: dup(0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) socket$key(0xf, 0x3, 0x2) 13:41:35 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xab, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 643.334132][T17320] __nla_validate_parse: 2 callbacks suppressed [ 643.334143][T17320] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:35 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6e, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 643.408851][T17331] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 643.462168][T17333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 13:41:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:41:35 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xac, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:35 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80080100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) gettid() ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{}, {}]}) ptrace$cont(0x7, r1, 0x0, 0x0) membarrier(0x0, 0x0) [ 643.559857][T17338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 643.573502][T17340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:35 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xad, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:41:35 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, 0x44, 0x0, @time, {}, {}, @ext={0xd0, &(0x7f00000001c0)="8ca5d7b20aaca7f9e57d4322bfa953fd61f379f1e01e129f16b431ea8197cb07921cb9cd2107c903593502a8bdc7f49897fe9e39ffed844c4cfa74c884108b7c545f2474f83a5169ee9769f9d498b29f426c722b1bb4018b51796910c56a9d6a0627f178912033879060b2432c88203613c15336cc05a93d886238fb50a9780cf14b4fb185b82fd55c0284fcbe77da591eaa0812c1a944ead764dcd0991d7ea22e7ae3b294f7685d60255a4a1c22552f0375fb71c1bd6d97812f8d9fffa5a0d981677a3e36d0af124298484ac7a94cd3"}}, {0xf9, 0x3f, 0x8, 0x7f, @tick=0x8, {0xc0, 0x40}, {0x2, 0x86}, @note={0x2, 0x81, 0x5, 0x2, 0x9}}], 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 643.716378][T17346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 643.748222][T17349] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:38 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:38 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, 0x44, 0x0, @time, {}, {}, @ext={0xd0, &(0x7f00000001c0)="8ca5d7b20aaca7f9e57d4322bfa953fd61f379f1e01e129f16b431ea8197cb07921cb9cd2107c903593502a8bdc7f49897fe9e39ffed844c4cfa74c884108b7c545f2474f83a5169ee9769f9d498b29f426c722b1bb4018b51796910c56a9d6a0627f178912033879060b2432c88203613c15336cc05a93d886238fb50a9780cf14b4fb185b82fd55c0284fcbe77da591eaa0812c1a944ead764dcd0991d7ea22e7ae3b294f7685d60255a4a1c22552f0375fb71c1bd6d97812f8d9fffa5a0d981677a3e36d0af124298484ac7a94cd3"}}, {0xf9, 0x3f, 0x8, 0x7f, @tick=0x8, {0xc0, 0x40}, {0x2, 0x86}, @note={0x2, 0x81, 0x5, 0x2, 0x9}}], 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:38 executing program 0: gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 13:41:38 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xae, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000000180)={{r0}, 0x7, &(0x7f0000000040)=[0x3, 0x8, 0x7fffffff, 0x4, 0x4, 0x3, 0x8], 0x0, 0x0, [0x2, 0x5ff000000000, 0x8000, 0x9]}) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:41:38 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = add_key$fscrypt_provisioning(&(0x7f0000000180)='fscrypt-provisioning\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000280)=ANY=[@ANYBLOB="010022927925f9788719bc99e553d9adb9e7a9ed5fe77e5f1e63255cc5a772d1c9a3c976c89cffe0eec50200fb7744af84a47af400"/62], 0x3e, 0xfffffffffffffffd) keyctl$reject(0x13, r2, 0x10001, 0x7fffffff, 0xfffffffffffffffd) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x8000000000001, &(0x7f0000000200)="f6dbf0ef0ba8501894ea6ae7d940da27ec09f1e6fac6995cbb5c55558dbf842668b7704a540c7aef3d6b73218710bbd66ef0170b3a5f6e59cb08d5084d81edebbac9766bb8193adcea1e5dd540407cbb5e6b99941dff4a3b34bb0e000000000000b3f57ebe14a5d6f4db25f16e40b6f9897e8874f145") ptrace$cont(0x7, r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0x100, 0x4) [ 646.447289][T17364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 646.460204][T17369] ptrace attach of "/root/syz-executor.0"[17367] was attempted by "/root/syz-executor.0"[17369] [ 646.482205][T17375] ptrace attach of "/root/syz-executor.1"[17365] was attempted by "/root/syz-executor.1"[17375] 13:41:38 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3f}, {0x6, 0x11, 0x6}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000011) 13:41:38 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, 0x44, 0x0, @time, {}, {}, @ext={0xd0, &(0x7f00000001c0)="8ca5d7b20aaca7f9e57d4322bfa953fd61f379f1e01e129f16b431ea8197cb07921cb9cd2107c903593502a8bdc7f49897fe9e39ffed844c4cfa74c884108b7c545f2474f83a5169ee9769f9d498b29f426c722b1bb4018b51796910c56a9d6a0627f178912033879060b2432c88203613c15336cc05a93d886238fb50a9780cf14b4fb185b82fd55c0284fcbe77da591eaa0812c1a944ead764dcd0991d7ea22e7ae3b294f7685d60255a4a1c22552f0375fb71c1bd6d97812f8d9fffa5a0d981677a3e36d0af124298484ac7a94cd3"}}, {0xf9, 0x3f, 0x8, 0x7f, @tick=0x8, {0xc0, 0x40}, {0x2, 0x86}, @note={0x2, 0x81, 0x5, 0x2, 0x9}}], 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:38 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'hsr0\x00'}) [ 646.523956][T17380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:38 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3f}, {0x6, 0x11, 0x6}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000011) 13:41:38 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, 0x44, 0x0, @time, {}, {}, @ext={0xd0, &(0x7f00000001c0)="8ca5d7b20aaca7f9e57d4322bfa953fd61f379f1e01e129f16b431ea8197cb07921cb9cd2107c903593502a8bdc7f49897fe9e39ffed844c4cfa74c884108b7c545f2474f83a5169ee9769f9d498b29f426c722b1bb4018b51796910c56a9d6a0627f178912033879060b2432c88203613c15336cc05a93d886238fb50a9780cf14b4fb185b82fd55c0284fcbe77da591eaa0812c1a944ead764dcd0991d7ea22e7ae3b294f7685d60255a4a1c22552f0375fb71c1bd6d97812f8d9fffa5a0d981677a3e36d0af124298484ac7a94cd3"}}, {0xf9, 0x3f, 0x8, 0x7f, @tick=0x8, {0xc0, 0x40}, {0x2, 0x86}, @note={0x2, 0x81, 0x5, 0x2, 0x9}}], 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) 13:41:38 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xaf, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 646.704688][T17397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 646.730519][T17401] ptrace attach of "/root/syz-executor.1"[17392] was attempted by "/root/syz-executor.1"[17401] 13:41:41 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:41 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, 0x44, 0x0, @time, {}, {}, @ext={0xd0, &(0x7f00000001c0)="8ca5d7b20aaca7f9e57d4322bfa953fd61f379f1e01e129f16b431ea8197cb07921cb9cd2107c903593502a8bdc7f49897fe9e39ffed844c4cfa74c884108b7c545f2474f83a5169ee9769f9d498b29f426c722b1bb4018b51796910c56a9d6a0627f178912033879060b2432c88203613c15336cc05a93d886238fb50a9780cf14b4fb185b82fd55c0284fcbe77da591eaa0812c1a944ead764dcd0991d7ea22e7ae3b294f7685d60255a4a1c22552f0375fb71c1bd6d97812f8d9fffa5a0d981677a3e36d0af124298484ac7a94cd3"}}, {0xf9, 0x3f, 0x8, 0x7f, @tick=0x8, {0xc0, 0x40}, {0x2, 0x86}, @note={0x2, 0x81, 0x5, 0x2, 0x9}}], 0x38) 13:41:41 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r4, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x40, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3f}, {0x6, 0x11, 0x6}}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x4000011) 13:41:41 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:41 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x101000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)=@in6={0xa, 0x4e23, 0x3, @loopback, 0x7}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)="0042cb23d8eed81a643f24a1911cfa74691bd0010a628ede172f2399917a62be09bef8b0e60b5dac78d33b09d157272e50efb1566107f514955b5704c5a4966c63bdac04e46ff3791a82a63bf67ca17e000b9f9bad30dbedb1043214272624a1859c4b2bf07f1222a126e96d951439d07fbbf4def1309d3207aabf362a2f036357456a005b8100acc9a156f1f413ddc69fa5dd9abf73f1fb3ad8196cefb05b752fa5d6e2f21388f53ee68893b1f3768cd46dc1", 0xb3}, {&(0x7f0000000280)="6b75314e9c9461aabcdaefaf0868971aec562e567c9bd18174ce1edfff7964c2d873d17f8d368eae6fb65075ed3d47de5b317d2c53b032a4535f68a7ee2e5035f8d9613e4bc6ef", 0x47}], 0x3, &(0x7f0000000340)=[@authinfo={0x18, 0x84, 0x6, {0x81}}, @dstaddrv4={0x18, 0x84, 0x7, @private=0xa010100}], 0x30, 0x804}, 0x4010800) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000140)={0x1}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x74, &(0x7f00000003c0)="5cf257b974057c79b1c2250ef5a497adeda77e9f03c2e56ff25a29f44ba005a5b92561272da8845d8f4689978c703de7f15e18f23221031217c950c638d26fdc5c9135500e8c5b633573ea4ff5c32c5acc0e41b40082e679182f897bbfb79fffcd0171de27d4feeb00"/116}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000500)={0x8, 0x3, 0x4, 0x3ffc, 0x7, [{0x1f1, 0x80, 0x6, [], 0x600}, {0xc8, 0x8, 0x4, [], 0x2004}, {0x5, 0x2, 0x7, [], 0x104}, {0x1, 0x1, 0x4, [], 0x2580}, {0x8000, 0x8, 0x600000000000000}, {0x7fff, 0x3, 0x400, [], 0x208}, {0x7fff, 0x2, 0x7, [], 0x80}]}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:41 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvme-fabrics\x00', 0x900, 0x0) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, r3, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040004}, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0xd, 0x1000}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:41 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 649.510908][T17419] __nla_validate_parse: 1 callbacks suppressed [ 649.510991][T17419] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 649.538731][T17426] ptrace attach of "/root/syz-executor.1"[17421] was attempted by "/root/syz-executor.1"[17426] 13:41:41 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_qrtr_TIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:41 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) [ 649.578895][T17429] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:41 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:41 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/210) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:41 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) [ 649.707862][T17448] ptrace attach of "/root/syz-executor.1"[17444] was attempted by "/root/syz-executor.1"[17448] [ 649.729842][T17453] ptrace attach of "/root/syz-executor.5"[17450] was attempted by "/root/syz-executor.5"[17453] 13:41:44 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:44 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb1, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:44 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:44 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000180)=""/240) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:44 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 13:41:44 executing program 5: gettid() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x8d, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x100008) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$sndseq(0xffffffffffffffff, &(0x7f0000000140)=[{0xbf, 0x5, 0x13, 0x2, @tick=0xffff, {0x5, 0x3}, {0x7f, 0x5}, @connect={{0x7f, 0x1}, {0x3, 0x3}}}, {0x40, 0xcf, 0x0, 0x6, @time={0x6, 0x8}, {0x2, 0xc0}, {0x6, 0x5}, @note={0xc, 0x1, 0x46, 0x81, 0x10000c67}}, {0x9, 0xb2, 0x0, 0x2, @tick=0x5, {0x1, 0xf3}, {0x9a, 0x1}, @raw32={[0x3, 0x10007, 0x7]}}, {0x7f, 0x80, 0x1, 0x4, @time={0x9}, {0x3, 0xf8}, {0x8, 0x6}, @connect={{0x6, 0x89}, {0x40, 0x1}}}], 0x70) ptrace$setregs(0xd, r0, 0x6, &(0x7f0000000040)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 652.629631][T17478] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.657715][T17484] ptrace attach of "/root/syz-executor.1"[17479] was attempted by "/root/syz-executor.1"[17484] 13:41:44 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) [ 652.678435][T17483] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:44 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) setsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000040)=0x1, 0x4) 13:41:44 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="00001fb4d466bed9f463a96fe8fc5a41987bb1fc78c940c54d38e6000000000000000000", 0x24}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:44 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) 13:41:44 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:44 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) [ 652.843633][T17503] ptrace attach of "/root/syz-executor.1"[17495] was attempted by "/root/syz-executor.1"[17503] [ 652.847203][T17502] ptrace attach of "/root/syz-executor.5"[17494] was attempted by "/root/syz-executor.5"[17502] [ 652.948655][T17509] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.973511][T17511] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:47 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:47 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) 13:41:47 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f00000001c0)=""/16) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSIG(r3, 0x40045436, 0x3b) mq_timedreceive(r3, &(0x7f0000000200)=""/128, 0x80, 0x9, &(0x7f0000000280)={0x77359400}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000180)=0x4) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:47 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/meminfo\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x4) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:41:47 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) 13:41:47 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb3, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 655.749956][T17527] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 655.797878][T17536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:47 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000180)=[{0xfd, 0x0, 0x0, 0x0, @tick=0x7, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x46, 0xe8, 0x4, 0xea, @tick=0x9, {0x80}, {0x40, 0x7f}, @raw8={"ee8839e9049a85bd070e71ac"}}, {0x5, 0x3f, 0x80, 0x81, @tick=0x1000, {0x20, 0x1}, {0x9, 0x80}, @result={0x3, 0x2}}, {0x7, 0x7, 0x6, 0x3f, @time={0x4, 0x1}, {0x2, 0x6}, {0x0, 0x6}, @result={0x3, 0x1}}, {0x80, 0xfc, 0x1f, 0x0, @tick=0x99, {}, {0x80, 0x8}, @raw32={[0x3, 0x4, 0xfffffff9]}}], 0x8c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:47 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r2, r3, 0xda}) wait4(r1, 0x0, 0x4000000a, 0x0) 13:41:47 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:47 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpgid(r0) ptrace$setopts(0x4200, r1, 0x0, 0x10) r2 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000004c0)="0f34", 0x2}, {&(0x7f0000000180)="5ea782e2c5f0ba46718b4e7d9527b17c224696cfe622b5d3cb0e4598288b4415a9e650e245535467450f22dc62621f8acfc77f2fc1314a42fede98547dc3ea9e86153512faa73a4f8a8df59e4b66ecb7bdd8f9fe5cea191f9f309724b1e23a79b02d7ef53d982aed7897d8e575fe51d245234bf0ca5b27b647dfc1d469d3ba6672f8ec8f432d630c6caeadc8a4b258f345f6a32ae7fdea1077b409f2a0cf8f46b2b387dbbd52ffa1b13ecfe537b3dff80f0d05043f979e4ff09413", 0xbb}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x10a1a0f4bdbec5ea, 0x40) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000280)) ioctl$SNDCTL_SEQ_NRSYNTHS(r4, 0x8004510a, &(0x7f0000000100)) write$sndseq(0xffffffffffffffff, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb, &(0x7f0000000140)="5cf249b974057c79b1c2ed"}}], 0x1c) ptrace$setregs(0xd, r2, 0x800, &(0x7f0000000380)="fcffeba51394239a25999c910e114c91c4e564c5c9dc301753202eb81f609cd4f74f9e847cadfceda6f94edb8ca479b9e119411f91f3993e7e16a7f7574d1dc9fdb3c0da79edb9564f9ed853efcc9ab6e07c0000000054fc65db2c30751eac3c5a5fa72769963e0cc340954ffe6f114353cf5d000bd131f1b3ab2c799d41a8f51c66b7d4773f8025d96742") ptrace$cont(0x7, r2, 0x0, 0xb) 13:41:47 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb4, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:47 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ptrace$cont(0x7, r3, 0x0, 0x0) [ 655.960876][T17550] ptrace attach of "/root/syz-executor.1"[17546] was attempted by "/root/syz-executor.1"[17550] [ 655.969458][T17553] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 655.985801][T17555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:50 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:50 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r1, r2, 0xda}) 13:41:50 executing program 5 (fault-call:8 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:41:50 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb5, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:50 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@private1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@rand_addr=' \x01\x00', @in=@dev={0xac, 0x14, 0x14, 0xa}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r4}, {}, {0x7ff}, 0x0, 0x0, 0x80000000000001, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x6c}, 0x0, @in6=@empty, 0xffffffff, 0x4, 0x0, 0x2, 0x0, 0x0, 0xfffffffe}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) read$FUSE(0xffffffffffffffff, &(0x7f0000000500)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$P9_RSTATu(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="6100000000594f66a256d1000008c1681f0100000008000000000000000000002f08000000510000000200000000000900275b267d7b5d403a230200284007002c212c5e2140290600245e", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6], 0x61) 13:41:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:50 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) [ 658.886277][T17583] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 658.892470][T17582] FAULT_INJECTION: forcing a failure. [ 658.892470][T17582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 658.911788][T17586] ptrace attach of "/root/syz-executor.1"[17584] was attempted by "/root/syz-executor.1"[17586] [ 658.953192][T17582] CPU: 1 PID: 17582 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 658.961986][T17582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.972046][T17582] Call Trace: [ 658.974993][T17592] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 658.975344][T17582] dump_stack+0x107/0x163 [ 658.975366][T17582] should_fail.cold+0x5/0xa [ 658.975390][T17582] _copy_from_user+0x2c/0x180 [ 658.975414][T17582] __copy_msghdr_from_user+0x91/0x4b0 13:41:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000180)="d16c054b5d5026dda2ddd500a714a570f20ff01177c3fd34a840e9131cc11cff5b37cf2a2f83fc5a0e25b69d0d824352a9a18dc0d6ec6ee3474e1ae9b682d012aecfe7dcdf867b95337ce1d4d02ceab8491d8f1687804e47a24f883ab8665db4d90bcf5b5933e8b381f27284de7e61e56f1e35bdc3e7a69b27fccce70263ffbf9312a6bbc9171a5c8f8a3fc2766ae8864520ea7fb0274327dfe46e0ba3342a2dbdddb557ec14d9b1feaa6ba558828c7d627b00"/190) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 659.003473][T17582] ? __ia32_sys_shutdown+0x70/0x70 [ 659.008602][T17582] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 659.014602][T17582] ? __lock_acquire+0xbbf/0x5590 [ 659.019556][T17582] sendmsg_copy_msghdr+0xa1/0x160 [ 659.024673][T17582] ? do_recvmmsg+0x6c0/0x6c0 [ 659.029282][T17582] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 659.035273][T17582] ? _parse_integer+0x132/0x180 [ 659.040144][T17582] ___sys_sendmsg+0xc6/0x170 [ 659.044764][T17582] ? sendmsg_copy_msghdr+0x160/0x160 13:41:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:50 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 659.050059][T17582] ? __fget_files+0x272/0x400 [ 659.054754][T17582] ? lock_downgrade+0x6d0/0x6d0 [ 659.059617][T17582] ? find_held_lock+0x2d/0x110 [ 659.064406][T17582] ? __fget_files+0x294/0x400 [ 659.069092][T17582] ? __fget_light+0xea/0x280 [ 659.073686][T17582] __sys_sendmsg+0xe5/0x1b0 [ 659.078211][T17582] ? __sys_sendmsg_sock+0xb0/0xb0 [ 659.083254][T17582] ? fput_many+0x2f/0x1a0 [ 659.087606][T17582] ? syscall_enter_from_user_mode+0x1d/0x50 [ 659.093518][T17582] do_syscall_64+0x2d/0x70 [ 659.097943][T17582] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 659.103843][T17582] RIP: 0033:0x45deb9 [ 659.107746][T17582] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 659.127449][T17582] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 659.135928][T17582] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 659.143890][T17582] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 659.151937][T17582] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 659.159935][T17582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 659.167893][T17582] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:41:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:53 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @time={0x3}, {0xfd}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}, {0x1, 0x9, 0x3c, 0xff, @time={0x81, 0x8}, {0x81, 0x1f}, {}, @raw8={"fab2893ba0b4443f3696fbc5"}}], 0x38) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:53 executing program 5 (fault-call:8 fault-nth:1): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:41:53 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:53 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup(0xffffffffffffffff) ioctl$USBDEVFS_SETCONFIGURATION(r1, 0x80045505, &(0x7f0000000040)=0xfffeffff) r2 = gettid() r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$qrtrtun(r4, &(0x7f0000000180)=""/151, 0x97) wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 13:41:53 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) [ 661.964050][T17626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:53 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 662.016829][T17629] FAULT_INJECTION: forcing a failure. [ 662.016829][T17629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 662.032925][T17637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 662.072844][T17629] CPU: 1 PID: 17629 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 662.075299][T17640] ptrace attach of "/root/syz-executor.2"[17636] was attempted by "/root/syz-executor.2"[17640] [ 662.081661][T17629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.081668][T17629] Call Trace: [ 662.081693][T17629] dump_stack+0x107/0x163 [ 662.081713][T17629] should_fail.cold+0x5/0xa [ 662.081736][T17629] _copy_from_user+0x2c/0x180 [ 662.081756][T17629] iovec_from_user+0x246/0x3c0 [ 662.081778][T17629] __import_iovec+0x65/0x500 [ 662.081803][T17629] import_iovec+0x10c/0x150 [ 662.081825][T17629] sendmsg_copy_msghdr+0x12d/0x160 [ 662.081841][T17629] ? do_recvmmsg+0x6c0/0x6c0 [ 662.081866][T17629] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 662.081887][T17629] ? _parse_integer+0x132/0x180 [ 662.081908][T17629] ___sys_sendmsg+0xc6/0x170 [ 662.081926][T17629] ? sendmsg_copy_msghdr+0x160/0x160 [ 662.081947][T17629] ? __fget_files+0x272/0x400 [ 662.081965][T17629] ? lock_downgrade+0x6d0/0x6d0 [ 662.081984][T17629] ? find_held_lock+0x2d/0x110 [ 662.082006][T17629] ? __fget_files+0x294/0x400 [ 662.082029][T17629] ? __fget_light+0xea/0x280 [ 662.186914][T17629] __sys_sendmsg+0xe5/0x1b0 [ 662.191447][T17629] ? __sys_sendmsg_sock+0xb0/0xb0 [ 662.196495][T17629] ? fput_many+0x2f/0x1a0 [ 662.200940][T17629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 662.206860][T17629] do_syscall_64+0x2d/0x70 [ 662.211553][T17629] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 662.217455][T17629] RIP: 0033:0x45deb9 [ 662.221360][T17629] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.240976][T17629] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 662.249403][T17629] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 662.257385][T17629] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 662.265365][T17629] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 13:41:54 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:41:54 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:54 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl$FBIOGET_FSCREENINFO(r2, 0x4602, &(0x7f0000000180)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/102395, 0x18ffb}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 662.273345][T17629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 662.281322][T17629] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:41:54 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb7, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:54 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:54 executing program 5 (fault-call:8 fault-nth:2): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:41:54 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x240, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:41:54 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000180)=""/90) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 662.432899][T17659] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 662.447907][T17660] Unknown ioctl 17922 13:41:54 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 662.510230][T17665] FAULT_INJECTION: forcing a failure. [ 662.510230][T17665] name failslab, interval 1, probability 0, space 0, times 1 [ 662.512900][T17667] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 662.568644][T17665] CPU: 1 PID: 17665 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 662.577442][T17665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.587507][T17665] Call Trace: [ 662.590818][T17665] dump_stack+0x107/0x163 [ 662.595165][T17665] should_fail.cold+0x5/0xa [ 662.599692][T17665] ? __alloc_skb+0x71/0x550 [ 662.604293][T17665] should_failslab+0x5/0x10 [ 662.608886][T17665] kmem_cache_alloc_node+0x34a/0x480 [ 662.614196][T17665] __alloc_skb+0x71/0x550 [ 662.618614][T17665] pfkey_sendmsg+0x146/0x800 [ 662.623221][T17665] ? security_socket_sendmsg+0x83/0xb0 [ 662.628694][T17665] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 662.634468][T17665] sock_sendmsg+0xcf/0x120 [ 662.638902][T17665] ____sys_sendmsg+0x6e8/0x810 [ 662.643682][T17665] ? kernel_sendmsg+0x50/0x50 [ 662.648369][T17665] ? do_recvmmsg+0x6c0/0x6c0 [ 662.652983][T17665] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 662.658971][T17665] ? _parse_integer+0x132/0x180 [ 662.663840][T17665] ___sys_sendmsg+0xf3/0x170 [ 662.668447][T17665] ? sendmsg_copy_msghdr+0x160/0x160 [ 662.673747][T17665] ? __fget_files+0x272/0x400 [ 662.678441][T17665] ? lock_downgrade+0x6d0/0x6d0 [ 662.683307][T17665] ? find_held_lock+0x2d/0x110 [ 662.688096][T17665] ? __fget_files+0x294/0x400 [ 662.692799][T17665] ? __fget_light+0xea/0x280 [ 662.697411][T17665] __sys_sendmsg+0xe5/0x1b0 [ 662.701926][T17665] ? __sys_sendmsg_sock+0xb0/0xb0 [ 662.706981][T17665] ? syscall_enter_from_user_mode+0x1d/0x50 [ 662.712892][T17665] do_syscall_64+0x2d/0x70 [ 662.717414][T17665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 662.723310][T17665] RIP: 0033:0x45deb9 [ 662.727216][T17665] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.746828][T17665] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 662.755256][T17665] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 13:41:54 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb8, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:54 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:54 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:41:54 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 662.763242][T17665] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 662.771226][T17665] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 662.779209][T17665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 662.787192][T17665] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c [ 662.844890][T17684] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 662.883042][T17688] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:41:57 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000140)}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:41:57 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0xd, 0x6, 0x801, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x10000004}, 0x40000) clock_adjtime(0x0, &(0x7f0000000180)={0x100000000, 0x1f, 0x8, 0x100000001, 0x1, 0x8, 0x7f, 0x6, 0x3, 0x0, 0x1, 0xed23a14, 0xe51, 0x6, 0x8, 0x3, 0x6, 0xf276, 0x7, 0x0, 0x2, 0x0, 0xc822, 0x3, 0x1000, 0x101}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r3}) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ioprio_get$pid(0x1, r1) 13:41:57 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:41:57 executing program 5 (fault-call:8 fault-nth:3): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:41:57 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xb9, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:41:57 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 665.424571][T17706] FAULT_INJECTION: forcing a failure. [ 665.424571][T17706] name failslab, interval 1, probability 0, space 0, times 0 [ 665.450835][T17703] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 665.479565][T17706] CPU: 1 PID: 17706 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 665.488364][T17706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.498516][T17706] Call Trace: [ 665.501822][T17706] dump_stack+0x107/0x163 [ 665.506166][T17706] should_fail.cold+0x5/0xa [ 665.510677][T17706] ? pfkey_sendmsg+0x146/0x800 [ 665.515455][T17706] ? pfkey_sendmsg+0x146/0x800 [ 665.520235][T17706] should_failslab+0x5/0x10 [ 665.524760][T17706] __kmalloc_node_track_caller+0x32e/0x410 [ 665.530581][T17706] ? kmem_cache_alloc_node+0x3ca/0x480 [ 665.536056][T17706] __alloc_skb+0xae/0x550 [ 665.540409][T17706] pfkey_sendmsg+0x146/0x800 [ 665.545102][T17706] ? security_socket_sendmsg+0x83/0xb0 [ 665.550577][T17706] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 665.556313][T17706] sock_sendmsg+0xcf/0x120 [ 665.560745][T17706] ____sys_sendmsg+0x6e8/0x810 [ 665.565522][T17706] ? kernel_sendmsg+0x50/0x50 [ 665.570208][T17706] ? do_recvmmsg+0x6c0/0x6c0 13:41:57 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:41:57 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) [ 665.574827][T17706] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 665.580821][T17706] ? _parse_integer+0x132/0x180 [ 665.585691][T17706] ___sys_sendmsg+0xf3/0x170 [ 665.590307][T17706] ? sendmsg_copy_msghdr+0x160/0x160 [ 665.595609][T17706] ? __fget_files+0x272/0x400 [ 665.600300][T17706] ? lock_downgrade+0x6d0/0x6d0 [ 665.605158][T17706] ? find_held_lock+0x2d/0x110 [ 665.609942][T17706] ? __fget_files+0x294/0x400 [ 665.614637][T17706] ? __fget_light+0xea/0x280 [ 665.619248][T17706] __sys_sendmsg+0xe5/0x1b0 [ 665.623766][T17706] ? __sys_sendmsg_sock+0xb0/0xb0 13:41:57 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 665.628820][T17706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 665.634731][T17706] do_syscall_64+0x2d/0x70 [ 665.639154][T17706] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 665.645051][T17706] RIP: 0033:0x45deb9 [ 665.648955][T17706] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.668566][T17706] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 13:41:57 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xba, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 665.676996][T17706] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 665.684974][T17706] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 665.692953][T17706] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 665.700931][T17706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 665.708906][T17706] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:41:57 executing program 4: gettid() r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:41:57 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 665.792090][T17730] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 665.858940][T17735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:00 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000140)}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:00 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:42:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xbb, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:00 executing program 5 (fault-call:8 fault-nth:4): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:00 executing program 1: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4200, r2, 0x6, 0x0) tkill(r2, 0x40) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x10002, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r0, 0x41) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xa, &(0x7f0000000140)="5cf249b974057c79b1c2"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$cont(0x9, r0, 0x1, 0x69) 13:42:00 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 668.576864][T17756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 668.581123][T17753] FAULT_INJECTION: forcing a failure. [ 668.581123][T17753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 668.630581][T17763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 668.657738][T17753] CPU: 0 PID: 17753 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 668.666539][T17753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.676609][T17753] Call Trace: 13:42:00 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) r3 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:42:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xbc, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 668.679919][T17753] dump_stack+0x107/0x163 [ 668.684278][T17753] should_fail.cold+0x5/0xa [ 668.688804][T17753] _copy_from_iter_full+0x201/0x920 [ 668.694067][T17753] ? __phys_addr_symbol+0x2c/0x70 [ 668.699137][T17753] ? __check_object_size+0x171/0x3f0 [ 668.704441][T17753] pfkey_sendmsg+0x1ae/0x800 [ 668.709055][T17753] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 668.714804][T17753] sock_sendmsg+0xcf/0x120 [ 668.719242][T17753] ____sys_sendmsg+0x6e8/0x810 [ 668.724027][T17753] ? kernel_sendmsg+0x50/0x50 13:42:00 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 668.728719][T17753] ? do_recvmmsg+0x6c0/0x6c0 [ 668.733334][T17753] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 668.739325][T17753] ? _parse_integer+0x132/0x180 [ 668.744197][T17753] ___sys_sendmsg+0xf3/0x170 [ 668.748806][T17753] ? sendmsg_copy_msghdr+0x160/0x160 [ 668.754113][T17753] ? __fget_files+0x272/0x400 [ 668.758806][T17753] ? lock_downgrade+0x6d0/0x6d0 [ 668.759302][T17773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 668.763666][T17753] ? find_held_lock+0x2d/0x110 13:42:00 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 668.763693][T17753] ? __fget_files+0x294/0x400 [ 668.763716][T17753] ? __fget_light+0xea/0x280 [ 668.763738][T17753] __sys_sendmsg+0xe5/0x1b0 [ 668.789197][T17776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 668.791433][T17753] ? __sys_sendmsg_sock+0xb0/0xb0 [ 668.791469][T17753] ? syscall_enter_from_user_mode+0x1d/0x50 [ 668.791489][T17753] do_syscall_64+0x2d/0x70 [ 668.791505][T17753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 668.791517][T17753] RIP: 0033:0x45deb9 13:42:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xbd, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 668.791538][T17753] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.845365][T17753] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 668.853802][T17753] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 668.861785][T17753] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 668.869765][T17753] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 668.877746][T17753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 668.885733][T17753] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c [ 668.950013][T17782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 668.963616][T17783] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:03 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, &(0x7f0000000140)}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:03 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x404, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x24000880) wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, 0x0, 0x0, 0x0) 13:42:03 executing program 1: r0 = socket(0x2, 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth0\x00', &(0x7f0000000000)=@ethtool_test}) 13:42:03 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:03 executing program 5 (fault-call:8 fault-nth:5): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:03 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xbe, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:03 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:03 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x169241, 0x0) 13:42:03 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 671.638393][T17804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 671.695421][T17802] FAULT_INJECTION: forcing a failure. [ 671.695421][T17802] name failslab, interval 1, probability 0, space 0, times 0 [ 671.720758][T17802] CPU: 0 PID: 17802 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 671.726555][T17809] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 671.729570][T17802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.729603][T17802] Call Trace: [ 671.729625][T17802] dump_stack+0x107/0x163 [ 671.729650][T17802] should_fail.cold+0x5/0xa [ 671.761788][T17802] ? skb_clone+0x14f/0x3c0 [ 671.766226][T17802] ? skb_clone+0x14f/0x3c0 [ 671.770658][T17802] should_failslab+0x5/0x10 [ 671.775175][T17802] kmem_cache_alloc+0x330/0x460 [ 671.780050][T17802] skb_clone+0x14f/0x3c0 [ 671.781990][T17816] ptrace attach of "/root/syz-executor.2"[17814] was attempted by "/root/syz-executor.2"[17816] [ 671.784310][T17802] pfkey_process+0xbc/0x800 [ 671.784338][T17802] ? pfkey_broadcast+0x630/0x630 [ 671.784360][T17802] ? __mutex_lock+0x626/0x10e0 [ 671.784381][T17802] ? pfkey_sendmsg+0x41f/0x800 [ 671.813851][T17802] ? lock_downgrade+0x6d0/0x6d0 [ 671.818719][T17802] ? mutex_lock_io_nested+0xf60/0xf60 [ 671.824105][T17802] ? iov_iter_advance+0x234/0xe30 [ 671.829155][T17802] ? _copy_from_iter_full+0x27c/0x920 [ 671.834543][T17802] ? __phys_addr_symbol+0x2c/0x70 [ 671.839583][T17802] ? __check_object_size+0x171/0x3f0 [ 671.844881][T17802] pfkey_sendmsg+0x42d/0x800 [ 671.849487][T17802] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 671.855224][T17802] sock_sendmsg+0xcf/0x120 [ 671.859658][T17802] ____sys_sendmsg+0x6e8/0x810 [ 671.864441][T17802] ? kernel_sendmsg+0x50/0x50 [ 671.869130][T17802] ? do_recvmmsg+0x6c0/0x6c0 [ 671.873742][T17802] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 671.879817][T17802] ? _parse_integer+0x132/0x180 [ 671.884687][T17802] ___sys_sendmsg+0xf3/0x170 [ 671.889295][T17802] ? sendmsg_copy_msghdr+0x160/0x160 [ 671.894596][T17802] ? __fget_files+0x272/0x400 [ 671.899290][T17802] ? lock_downgrade+0x6d0/0x6d0 [ 671.904155][T17802] ? find_held_lock+0x2d/0x110 [ 671.908940][T17802] ? __fget_files+0x294/0x400 [ 671.913639][T17802] ? __fget_light+0xea/0x280 [ 671.918247][T17802] __sys_sendmsg+0xe5/0x1b0 [ 671.922762][T17802] ? __sys_sendmsg_sock+0xb0/0xb0 [ 671.927819][T17802] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.933740][T17802] do_syscall_64+0x2d/0x70 [ 671.938179][T17802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 671.944079][T17802] RIP: 0033:0x45deb9 [ 671.947988][T17802] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.967598][T17802] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 671.976028][T17802] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 671.984010][T17802] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 13:42:03 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4, &(0x7f0000000140)="5cf249b9"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:03 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 671.991987][T17802] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 671.999969][T17802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 672.007949][T17802] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:42:03 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xbf, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:03 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:42:03 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) [ 672.173771][T17833] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:04 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:04 executing program 1: io_setup(0x8000, &(0x7f0000000000)) io_setup(0x4, &(0x7f00000000c0)=0x0) io_submit(r0, 0x0, 0x0) [ 672.227005][T17839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:04 executing program 5 (fault-call:8 fault-nth:6): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 13:42:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:04 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:04 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 672.563900][T17859] FAULT_INJECTION: forcing a failure. [ 672.563900][T17859] name failslab, interval 1, probability 0, space 0, times 0 [ 672.615460][T17859] CPU: 1 PID: 17859 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 672.624252][T17859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.634305][T17859] Call Trace: [ 672.637585][T17859] dump_stack+0x107/0x163 [ 672.641916][T17859] should_fail.cold+0x5/0xa [ 672.646485][T17859] ? xfrm_policy_alloc+0x82/0x420 [ 672.651519][T17859] should_failslab+0x5/0x10 [ 672.656027][T17859] kmem_cache_alloc_trace+0x2bc/0x370 [ 672.661412][T17859] xfrm_policy_alloc+0x82/0x420 [ 672.666276][T17859] pfkey_spdadd+0x307/0x1550 [ 672.670887][T17859] ? pfkey_migrate+0xfa0/0xfa0 [ 672.675661][T17859] ? kfree_skbmem+0xef/0x1b0 [ 672.680259][T17859] ? kfree_skb+0x140/0x3f0 [ 672.684684][T17859] ? pfkey_broadcast+0x3e1/0x630 [ 672.689633][T17859] ? pfkey_migrate+0xfa0/0xfa0 [ 672.694408][T17859] pfkey_process+0x68b/0x800 [ 672.699018][T17859] ? pfkey_broadcast+0x630/0x630 [ 672.703964][T17859] ? __mutex_lock+0x626/0x10e0 [ 672.708764][T17859] ? _copy_from_iter_full+0x27c/0x920 [ 672.714146][T17859] ? __phys_addr_symbol+0x2c/0x70 [ 672.719182][T17859] ? __check_object_size+0x171/0x3f0 [ 672.724482][T17859] pfkey_sendmsg+0x42d/0x800 [ 672.729089][T17859] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 672.734823][T17859] sock_sendmsg+0xcf/0x120 [ 672.739252][T17859] ____sys_sendmsg+0x6e8/0x810 [ 672.744028][T17859] ? kernel_sendmsg+0x50/0x50 [ 672.748708][T17859] ? do_recvmmsg+0x6c0/0x6c0 [ 672.753315][T17859] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 672.759303][T17859] ? _parse_integer+0x132/0x180 [ 672.764170][T17859] ___sys_sendmsg+0xf3/0x170 [ 672.768773][T17859] ? sendmsg_copy_msghdr+0x160/0x160 [ 672.774069][T17859] ? __fget_files+0x272/0x400 [ 672.778759][T17859] ? lock_downgrade+0x6d0/0x6d0 [ 672.783621][T17859] ? find_held_lock+0x2d/0x110 [ 672.788410][T17859] ? __fget_files+0x294/0x400 [ 672.793108][T17859] ? __fget_light+0xea/0x280 [ 672.797718][T17859] __sys_sendmsg+0xe5/0x1b0 [ 672.802231][T17859] ? __sys_sendmsg_sock+0xb0/0xb0 [ 672.807284][T17859] ? syscall_enter_from_user_mode+0x1d/0x50 [ 672.813189][T17859] do_syscall_64+0x2d/0x70 [ 672.817612][T17859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 672.823510][T17859] RIP: 0033:0x45deb9 [ 672.827411][T17859] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.847020][T17859] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 672.855447][T17859] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 672.863428][T17859] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 672.871409][T17859] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 672.879393][T17859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 672.887380][T17859] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:42:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 13:42:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001900090000000000000000000a", @ANYRES64], 0x24}}, 0x0) 13:42:06 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4, &(0x7f0000000140)="5cf249b9"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:06 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc1, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:06 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:06 executing program 5 (fault-call:8 fault-nth:7): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 675.159130][T17873] __nla_validate_parse: 2 callbacks suppressed [ 675.159142][T17873] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 13:42:06 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) [ 675.210802][T17874] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 675.245408][T17881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 13:42:07 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000000)={'wg1\x00', @ifru_map}) [ 675.261341][T17875] FAULT_INJECTION: forcing a failure. [ 675.261341][T17875] name failslab, interval 1, probability 0, space 0, times 0 [ 675.314161][T17875] CPU: 1 PID: 17875 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 675.322958][T17875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.333019][T17875] Call Trace: [ 675.336331][T17875] dump_stack+0x107/0x163 [ 675.340677][T17875] should_fail.cold+0x5/0xa [ 675.345195][T17875] ? __alloc_skb+0x71/0x550 [ 675.349708][T17875] should_failslab+0x5/0x10 [ 675.354225][T17875] kmem_cache_alloc_node+0x34a/0x480 [ 675.359535][T17875] __alloc_skb+0x71/0x550 13:42:07 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:07 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) [ 675.363877][T17875] pfkey_sendmsg+0x46c/0x800 [ 675.368479][T17875] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 675.374213][T17875] sock_sendmsg+0xcf/0x120 [ 675.378646][T17875] ____sys_sendmsg+0x6e8/0x810 [ 675.383425][T17875] ? kernel_sendmsg+0x50/0x50 [ 675.388114][T17875] ? do_recvmmsg+0x6c0/0x6c0 [ 675.392719][T17875] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 675.398709][T17875] ? _parse_integer+0x132/0x180 [ 675.403577][T17875] ___sys_sendmsg+0xf3/0x170 [ 675.408181][T17875] ? sendmsg_copy_msghdr+0x160/0x160 13:42:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0x8, &(0x7f0000000100)={&(0x7f00000000c0)={0x6, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x200448c7}, 0x4810) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r1, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={0x0}, 0x1, 0x0, 0x0, 0x8880}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x200008c0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'netdevsim0\x00', 0x2}, 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'bridge_slave_0\x00'}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000580)={'syztnl1\x00', &(0x7f0000000780)={'erspan0\x00', 0x0, 0x0, 0x8000, 0xffffffff, 0xd158, {{0x1a, 0x4, 0x2, 0x21, 0x68, 0x65, 0x0, 0xfd, 0x2f, 0x0, @private=0xa010102, @multicast2, {[@ssrr={0x89, 0xb, 0xd4, [@dev={0xac, 0x14, 0x14, 0x19}, @dev={0xac, 0x14, 0x14, 0x2d}]}, @ssrr={0x89, 0xf, 0xfd, [@rand_addr=0x64010101, @broadcast, @multicast1]}, @rr={0x7, 0x7, 0x62, [@loopback]}, @rr={0x7, 0x7, 0x75, [@local]}, @rr={0x7, 0xf, 0x5f, [@multicast2, @multicast1, @rand_addr=0x64010101]}, @timestamp_prespec={0x44, 0x14, 0xa8, 0x3, 0x5, [{@multicast1, 0x3ff}, {@broadcast, 0x800}]}, @end, @ssrr={0x89, 0x7, 0x4c, [@dev={0xac, 0x14, 0x14, 0xa}]}]}}}}}) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04002cbd7000fbdbdf25030000000500040001000000140002007866726d3000000000000000000000000900010073797a3200000000096d9fddfbfa8d9380000000140002006970365f7674693000000000000000000500040002000000"], 0x64}, 0x1, 0x0, 0x0, 0x20000050}, 0x10) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r2, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={0x0}}, 0x0) io_setup(0x3f, &(0x7f00000005c0)=0x0) io_cancel(r4, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x7, 0x1000, r3, &(0x7f0000000600)="f053b83c1f33953bd7e1ab21969c717a9f0120676fc71b4c3480504fd5d56ff56baa2275131a5fe69ad1a9406a6cfd17501f248f5cc4e752af25b2347a5838512cc4914fde6d37a5c2544742faae2e1bd281f8d9929f0eb7cef40437604247f42f6e7e3afbe4a8ff89a973a0359c93a11dfd43e13b6084adc6adbca0bf552b240dfe245976d610a9b9add6ded6e2696b28bf3c86cc55748c1bbe600c86fb40cba91c75f533be2446554633920564419c3fdb232462469fec5317d2494d5c24efe844968d94c178b4669cb2c61200c6bbf9236740", 0xd4, 0x81}, &(0x7f0000000740)) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r5, 0x10, 0x70bd26, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4040000) 13:42:07 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) [ 675.413479][T17875] ? __fget_files+0x272/0x400 [ 675.418166][T17875] ? lock_downgrade+0x6d0/0x6d0 [ 675.423027][T17875] ? find_held_lock+0x2d/0x110 [ 675.427810][T17875] ? __fget_files+0x294/0x400 [ 675.432509][T17875] ? __fget_light+0xea/0x280 [ 675.437115][T17875] __sys_sendmsg+0xe5/0x1b0 [ 675.441631][T17875] ? __sys_sendmsg_sock+0xb0/0xb0 [ 675.446696][T17875] ? syscall_enter_from_user_mode+0x1d/0x50 [ 675.452605][T17875] do_syscall_64+0x2d/0x70 [ 675.457032][T17875] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 675.462928][T17875] RIP: 0033:0x45deb9 [ 675.466829][T17875] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.486436][T17875] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 675.494857][T17875] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 675.502837][T17875] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 675.510810][T17875] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 675.518795][T17875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 675.526777][T17875] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:42:10 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x4, &(0x7f0000000140)="5cf249b9"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:10 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:42:10 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) 13:42:10 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x0, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000001700), 0x0) 13:42:10 executing program 5 (fault-call:8 fault-nth:8): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 678.310334][T17926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 678.312314][T17925] FAULT_INJECTION: forcing a failure. [ 678.312314][T17925] name failslab, interval 1, probability 0, space 0, times 0 13:42:10 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x0, 0x0, @mcast1}], 0x2c) [ 678.363032][T17925] CPU: 0 PID: 17925 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 678.371827][T17925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.381893][T17925] Call Trace: [ 678.385199][T17925] dump_stack+0x107/0x163 [ 678.389539][T17925] should_fail.cold+0x5/0xa [ 678.394056][T17925] ? pfkey_sendmsg+0x46c/0x800 [ 678.398830][T17925] ? pfkey_sendmsg+0x46c/0x800 [ 678.403610][T17925] should_failslab+0x5/0x10 13:42:10 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='y', 0x1, 0xfffffffffffffffc) [ 678.408119][T17925] __kmalloc_node_track_caller+0x32e/0x410 [ 678.413936][T17925] ? kmem_cache_alloc_node+0x3ca/0x480 [ 678.419420][T17925] __alloc_skb+0xae/0x550 [ 678.423768][T17925] pfkey_sendmsg+0x46c/0x800 [ 678.428381][T17925] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 678.434114][T17925] sock_sendmsg+0xcf/0x120 [ 678.438542][T17925] ____sys_sendmsg+0x6e8/0x810 [ 678.443322][T17925] ? kernel_sendmsg+0x50/0x50 [ 678.448178][T17925] ? do_recvmmsg+0x6c0/0x6c0 [ 678.452787][T17925] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 678.458772][T17925] ? _parse_integer+0x132/0x180 13:42:10 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffa) [ 678.463637][T17925] ___sys_sendmsg+0xf3/0x170 [ 678.468237][T17925] ? sendmsg_copy_msghdr+0x160/0x160 [ 678.473537][T17925] ? __fget_files+0x272/0x400 [ 678.478221][T17925] ? lock_downgrade+0x6d0/0x6d0 [ 678.483084][T17925] ? find_held_lock+0x2d/0x110 [ 678.487865][T17925] ? __fget_files+0x294/0x400 [ 678.492550][T17925] ? __fget_light+0xea/0x280 [ 678.497155][T17925] __sys_sendmsg+0xe5/0x1b0 [ 678.501667][T17925] ? __sys_sendmsg_sock+0xb0/0xb0 [ 678.506717][T17925] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.512623][T17925] do_syscall_64+0x2d/0x70 [ 678.517049][T17925] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 678.522942][T17925] RIP: 0033:0x45deb9 [ 678.526842][T17925] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.546459][T17925] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 678.554882][T17925] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 13:42:10 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) 13:42:10 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) [ 678.562861][T17925] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 678.570837][T17925] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 [ 678.578812][T17925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 678.586789][T17925] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:42:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) [ 678.629967][T17941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:13 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6, &(0x7f0000000140)="5cf249b97405"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:13 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) r4 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r3, 0x0, 0x0) 13:42:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc3, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) 13:42:13 executing program 5 (fault-call:8 fault-nth:9): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:13 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x0, 0x0, 0xf}) [ 681.354743][T17960] FAULT_INJECTION: forcing a failure. [ 681.354743][T17960] name failslab, interval 1, probability 0, space 0, times 0 [ 681.361279][T17962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.427784][T17960] CPU: 1 PID: 17960 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 681.433924][T17966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.436575][T17960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.436582][T17960] Call Trace: [ 681.436605][T17960] dump_stack+0x107/0x163 [ 681.436625][T17960] should_fail.cold+0x5/0xa [ 681.436647][T17960] ? skb_clone+0x14f/0x3c0 [ 681.472612][T17960] ? skb_clone+0x14f/0x3c0 [ 681.477067][T17960] should_failslab+0x5/0x10 [ 681.481583][T17960] kmem_cache_alloc+0x330/0x460 [ 681.486445][T17960] skb_clone+0x14f/0x3c0 [ 681.490707][T17960] pfkey_broadcast_one+0xb9/0x360 [ 681.495757][T17960] pfkey_broadcast+0x3cc/0x630 [ 681.500528][T17960] pfkey_sendmsg+0x6ec/0x800 [ 681.505122][T17960] ? pfkey_send_new_mapping+0x11b0/0x11b0 [ 681.510852][T17960] sock_sendmsg+0xcf/0x120 [ 681.515285][T17960] ____sys_sendmsg+0x6e8/0x810 [ 681.520061][T17960] ? kernel_sendmsg+0x50/0x50 [ 681.524741][T17960] ? do_recvmmsg+0x6c0/0x6c0 [ 681.529351][T17960] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 681.535336][T17960] ? _parse_integer+0x132/0x180 [ 681.540198][T17960] ___sys_sendmsg+0xf3/0x170 [ 681.541054][T17974] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.544800][T17960] ? sendmsg_copy_msghdr+0x160/0x160 [ 681.544823][T17960] ? __fget_files+0x272/0x400 [ 681.544841][T17960] ? lock_downgrade+0x6d0/0x6d0 [ 681.544863][T17960] ? find_held_lock+0x2d/0x110 [ 681.573573][T17960] ? __fget_files+0x294/0x400 [ 681.574736][T17976] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.578257][T17960] ? __fget_light+0xea/0x280 [ 681.578280][T17960] __sys_sendmsg+0xe5/0x1b0 [ 681.578300][T17960] ? __sys_sendmsg_sock+0xb0/0xb0 [ 681.601688][T17960] ? syscall_enter_from_user_mode+0x1d/0x50 [ 681.607607][T17960] do_syscall_64+0x2d/0x70 [ 681.612037][T17960] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 681.617933][T17960] RIP: 0033:0x45deb9 13:42:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc4, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:13 executing program 1: bpf$ITER_CREATE(0xd, 0x0, 0x0) 13:42:13 executing program 0: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:13 executing program 0: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:13 executing program 0: gettid() clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc5, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 681.621832][T17960] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.641440][T17960] RSP: 002b:00007fd224e16c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 681.649861][T17960] RAX: ffffffffffffffda RBX: 000000000002e4c0 RCX: 000000000045deb9 [ 681.657840][T17960] RDX: 0000000000000000 RSI: 00000000205f5000 RDI: 0000000000000007 [ 681.665815][T17960] RBP: 00007fd224e16ca0 R08: 0000000000000000 R09: 0000000000000000 13:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 13:42:13 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6, &(0x7f0000000140)="5cf249b97405"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) [ 681.671811][T17985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 681.673782][T17960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 681.673794][T17960] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c 13:42:13 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x10b042, 0x0) [ 681.815489][T17995] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:13 executing program 5 (fault-call:8 fault-nth:10): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 13:42:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc6, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:13 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x0, 0x0) connect$qrtr(r0, &(0x7f0000000000), 0xfffffffffffffe6b) [ 682.025316][T18007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 13:42:13 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x2060) [ 682.086001][T18013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 682.087216][T18012] FAULT_INJECTION: forcing a failure. [ 682.087216][T18012] name fail_usercopy, interval 1, probability 0, space 0, times 0 13:42:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) [ 682.206396][T18012] CPU: 1 PID: 18012 Comm: syz-executor.5 Not tainted 5.10.0-rc3-syzkaller #0 [ 682.215199][T18012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.225259][T18012] Call Trace: [ 682.228564][T18012] dump_stack+0x107/0x163 [ 682.232911][T18012] should_fail.cold+0x5/0xa [ 682.237432][T18012] _copy_to_user+0x2c/0x150 [ 682.241964][T18012] simple_read_from_buffer+0xcc/0x160 [ 682.247356][T18012] proc_fail_nth_read+0x187/0x220 [ 682.252394][T18012] ? proc_exe_link+0x1d0/0x1d0 [ 682.257170][T18012] ? security_file_permission+0x248/0x560 [ 682.262903][T18012] ? proc_exe_link+0x1d0/0x1d0 [ 682.267678][T18012] vfs_read+0x1b5/0x570 [ 682.271853][T18012] ksys_read+0x12d/0x250 [ 682.276106][T18012] ? vfs_write+0x700/0x700 [ 682.280534][T18012] ? syscall_enter_from_user_mode+0x1d/0x50 [ 682.286440][T18012] do_syscall_64+0x2d/0x70 [ 682.290875][T18012] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 682.296770][T18012] RIP: 0033:0x4177b1 [ 682.300673][T18012] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 682.320282][T18012] RSP: 002b:00007fd224e16c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 682.328712][T18012] RAX: ffffffffffffffda RBX: 00000000000000a0 RCX: 00000000004177b1 [ 682.336690][T18012] RDX: 000000000000000f RSI: 00007fd224e16cb0 RDI: 0000000000000008 [ 682.344696][T18012] RBP: 00000000000000a0 R08: 0000000000000000 R09: 0000000000000000 13:42:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc7, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 682.352764][T18012] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000000a [ 682.360864][T18012] R13: 000000000169fb7f R14: 00007fd224e179c0 R15: 000000000118bf2c [ 682.526708][T18025] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 682.560762][T18029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:16 executing program 1: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) ustat(0x0, 0x0) 13:42:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:16 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6, &(0x7f0000000140)="5cf249b97405"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc8, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:16 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0x400448c9, &(0x7f0000000040)={0x0, @pix_mp}) 13:42:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xc9, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x2, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xa, 0x1005, 0x8}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001bc0)=r1, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001080)={r1, 0x0, 0x0}, 0x20) 13:42:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xca, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7, &(0x7f0000000140)="5cf249b974057c"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r2 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) r3 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r2, 0x0, 0x0) 13:42:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:19 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:42:19 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xcb, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 687.870619][T18088] __nla_validate_parse: 6 callbacks suppressed [ 687.870630][T18088] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:19 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6862a4201979153c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:42:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) 13:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 687.974308][T18098] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x2f, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:19 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7, &(0x7f0000000140)="5cf249b974057c"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:19 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xcc, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:19 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) close(r0) 13:42:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) 13:42:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 688.184222][T18118] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x2f00, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 688.266379][T18124] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:20 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'geneve1\x00', @remote}) r1 = socket$kcm(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000007c0)={'geneve1\x00', @link_local}) 13:42:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}]}, 0x78}}, 0x0) 13:42:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:20 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xcd, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 688.730565][T18148] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 689.092083][T18154] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:22 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7, &(0x7f0000000140)="5cf249b974057c"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x34000, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:22 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:22 executing program 1: socketpair(0x25, 0x1, 0x1, &(0x7f0000000040)) 13:42:22 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xce, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 691.175355][T18170] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:23 executing program 1: [ 691.246637][T18178] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:23 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xcf, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x400300, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) [ 691.402514][T18191] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 691.447106][T18193] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:25 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:25 executing program 1: 13:42:25 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x0, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:25 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xd0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x1000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:26 executing program 1: [ 694.261501][T18210] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 694.319610][T18216] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x2000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:26 executing program 1: 13:42:29 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000140)="5cf249b974057c79"}}], 0x1c) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:29 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000840)=ANY=[@ANYBLOB="200000001e000901"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0xd1, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 13:42:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:29 executing program 1: 13:42:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x4000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) 13:42:29 executing program 1: [ 697.379405][T18249] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) 13:42:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0x6, 0x13, @udp='udp:syz0\x00'}}}, 0x2c}}, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x2, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x131200, 0x3) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000340)={0x3, 0x0, 0x7, 0x1}) ptrace$cont(0x7, r1, 0x0, 0x0) [ 697.464868][T18259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 13:42:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f000080e000)={0x2, 0xe, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, @in=@dev}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff80, 0x0, @in6={0xa, 0x0, 0x0, @private1}}]}, 0xa0}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f00005f5000)={0x2f000000, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020e000014000000000000000000000005000600000080000a000000000000000000000000000000200000000000000000000000000000000800120000000200000000000000000006000000000000000000000000000000ac14ffbb000000000000000000000000ac14140000000000000000000000000005000500008000000a003a7940308ca39c"], 0xa0}}, 0x0) 13:42:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000f7ffffffffffffff00000000000000000000000000000e00000004000000cc02000074020000b0000000b000000000000000b0000000080300003802000038020000380200000803ef00040000000000000000000000000000000000000000000000000000000000000000000900000000000000000000003bba0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000007000b000000000000000000000000000000000000000000040004c4f470000000000000000000000000000000000000000000000000000000000a6fe86583a0c9da81c652b77a96d3e38ada3dbf9bc2d9b05778350aea1000000000000000000000000000000000000000000000000000000000000f1ffffff000000df0000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000009400f400000000020000ecffffff00000000000000000000240065636e0000000000000000008b0000000000010000000000000000000000010000006000534554000000000800000000000010000000000000000000000000000000000000004cb090f6315808a28a3112000000000000000000000000000000000000000000000052994e8ae86cce53000000000000000000000000000010830000e0000001e00000010000660ec80fdbd3ab0c36746e6c30000000000000000000776731000000000000160000deffffffffffff0f002000000000000000000000000010000000ffff000000000000000000000000000000007000940000000000000000005800000000000000000000fe240052454a4543540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700094000000000000000000000000000000000000000000240000000000000000000000000000150000000000f7ff000000000000000000feffffff"], 0x1) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000240)={0x2, 0x0, @empty}, 0x10) [ 698.428402][ T1645] INFO: task syz-executor.1:15493 blocked for more than 143 seconds. [ 698.436583][ T1645] Not tainted 5.10.0-rc3-syzkaller #0 [ 698.443870][ T1645] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 698.452993][ T1645] task:syz-executor.1 state:D stack:28536 pid:15493 ppid: 8585 flags:0x00000000 [ 698.462647][ T1645] Call Trace: [ 698.465989][ T1645] __schedule+0x893/0x2130 [ 698.473553][ T1645] ? io_schedule_timeout+0x140/0x140 [ 698.478995][ T1645] ? mark_held_locks+0x9f/0xe0 [ 698.483834][ T1645] ? rwlock_bug.part.0+0x90/0x90 [ 698.488926][ T1645] schedule+0xcf/0x270 [ 698.493000][ T1645] rwsem_down_write_slowpath+0x603/0xc60 [ 698.499002][ T1645] ? rwsem_mark_wake+0x870/0x870 [ 698.503976][ T1645] ? lock_release+0x710/0x710 [ 698.508773][ T1645] down_write+0x137/0x150 [ 698.513114][ T1645] ? down_write_killable+0x170/0x170 [ 698.518565][ T1645] ? preempt_count_add+0x74/0x140 [ 698.523697][ T1645] ? __mnt_want_write+0x1bc/0x2a0 [ 698.528858][ T1645] path_openat+0x907/0x2730 [ 698.533383][ T1645] ? path_lookupat+0x830/0x830 [ 698.538277][ T1645] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 698.544263][ T1645] do_filp_open+0x17e/0x3c0 [ 698.548848][ T1645] ? may_open_dev+0xf0/0xf0 [ 698.553405][ T1645] ? do_raw_spin_lock+0x120/0x2b0 [ 698.558593][ T1645] ? rwlock_bug.part.0+0x90/0x90 [ 698.564459][ T1645] ? _raw_spin_unlock+0x24/0x40 [ 698.570176][ T1645] ? __alloc_fd+0x28d/0x600 [ 698.574697][ T1645] do_sys_openat2+0x16d/0x420 [ 698.581683][ T1645] ? build_open_flags+0x650/0x650 [ 698.586755][ T1645] ? put_timespec64+0xcb/0x120 [ 698.591693][ T1645] ? ns_to_timespec64+0xc0/0xc0 [ 698.596599][ T1645] ? __do_sys_futex+0x2a2/0x470 [ 698.601592][ T1645] __x64_sys_creat+0xc9/0x120 [ 698.606270][ T1645] ? __x32_compat_sys_openat+0x1f0/0x1f0 [ 698.612002][ T1645] ? syscall_enter_from_user_mode+0x1d/0x50 [ 698.617903][ T1645] ? lockdep_hardirqs_on+0x79/0x100 [ 698.623270][ T1645] do_syscall_64+0x2d/0x70 [ 698.627750][ T1645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 698.633782][ T1645] RIP: 0033:0x45deb9 [ 698.637711][ T1645] Code: Unable to access opcode bytes at RIP 0x45de8f. [ 698.644672][ T1645] RSP: 002b:00007f46facb1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 698.653255][ T1645] RAX: ffffffffffffffda RBX: 0000000000002a00 RCX: 000000000045deb9 [ 698.661684][ T1645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020002100 [ 698.670301][ T1645] RBP: 000000000118c0a8 R08: 0000000000000000 R09: 0000000000000000 [ 698.679166][ T1645] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118c07c [ 698.687138][ T1645] R13: 000000000169fb7f R14: 00007f46facb29c0 R15: 000000000118c07c [ 698.697554][ T1645] [ 698.697554][ T1645] Showing all locks held in the system: [ 698.705377][ T1645] 1 lock held by khungtaskd/1645: [ 698.710521][ T1645] #0: ffffffff8b337160 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 698.720514][ T1645] 2 locks held by in:imklog/8206: [ 698.725530][ T1645] #0: ffff888021d1eff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 698.734742][ T1645] #1: ffffffff8f0ab630 (&obj_hash[i].lock){-.-.}-{2:2}, at: is_bpf_text_address+0x0/0x160 [ 698.744979][ T1645] 3 locks held by syz-executor.1/15464: [ 698.750636][ T1645] #0: ffff888011f02460 (sb_writers#15){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 698.760004][ T1645] #1: ffff88802e990150 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x907/0x2730 [ 698.770736][ T1645] #2: ffff88802e990528 (&fi->mutex){+.+.}-{3:3}, at: fuse_lock_inode+0xdf/0x120 [ 698.780047][ T1645] 2 locks held by syz-executor.1/15493: [ 698.785588][ T1645] #0: ffff888011f02460 (sb_writers#15){.+.+}-{0:0}, at: mnt_want_write+0x3a/0xb0 [ 698.795618][ T1645] #1: ffff88802e990150 (&type->i_mutex_dir_key#8){++++}-{3:3}, at: path_openat+0x907/0x2730 [ 698.808293][ T1645] [ 698.810630][ T1645] ============================================= [ 698.810630][ T1645] [ 698.819176][ T1645] NMI backtrace for cpu 1 [ 698.823499][ T1645] CPU: 1 PID: 1645 Comm: khungtaskd Not tainted 5.10.0-rc3-syzkaller #0 [ 698.831797][ T1645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.841830][ T1645] Call Trace: [ 698.845103][ T1645] dump_stack+0x107/0x163 [ 698.849418][ T1645] nmi_cpu_backtrace.cold+0x44/0xd7 [ 698.854941][ T1645] ? lapic_can_unplug_cpu+0x80/0x80 [ 698.860152][ T1645] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 698.866139][ T1645] watchdog+0xd43/0xfa0 [ 698.870288][ T1645] ? reset_hung_task_detector+0x30/0x30 [ 698.875820][ T1645] kthread+0x3af/0x4a0 [ 698.879867][ T1645] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 698.885775][ T1645] ret_from_fork+0x1f/0x30 [ 698.890771][ T1645] Sending NMI from CPU 1 to CPUs 0: [ 698.896066][ C0] NMI backtrace for cpu 0 skipped: idling at acpi_idle_do_entry+0x1c9/0x250 [ 698.896982][ T1645] Kernel panic - not syncing: hung_task: blocked tasks [ 698.911564][ T1645] CPU: 1 PID: 1645 Comm: khungtaskd Not tainted 5.10.0-rc3-syzkaller #0 [ 698.919882][ T1645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.929920][ T1645] Call Trace: [ 698.933204][ T1645] dump_stack+0x107/0x163 [ 698.937552][ T1645] panic+0x306/0x73d [ 698.941431][ T1645] ? __warn_printk+0xf3/0xf3 [ 698.946046][ T1645] ? cpumask_next+0x3c/0x40 [ 698.950558][ T1645] ? printk_safe_flush+0xea/0x160 [ 698.955598][ T1645] ? watchdog.cold+0x5/0x158 [ 698.960167][ T1645] ? watchdog+0xa80/0xfa0 [ 698.964481][ T1645] watchdog.cold+0x16/0x158 [ 698.968965][ T1645] ? reset_hung_task_detector+0x30/0x30 [ 698.974494][ T1645] kthread+0x3af/0x4a0 [ 698.978547][ T1645] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 698.984419][ T1645] ret_from_fork+0x1f/0x30 [ 698.989685][ T1645] Kernel Offset: disabled [ 698.994012][ T1645] Rebooting in 86400 seconds..