bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x60000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:56 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6c}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:56 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000027c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000001200)={'syz0\x00'}, 0x45c) 20:12:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) 20:12:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x10001000a00) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./bus\x00', 0x200) sendfile(r1, r2, 0x0, 0xfffffffffffffffc) 20:12:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x74]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:12:56 executing program 5: r0 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r0, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)) 20:12:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_adj\x00') writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=':', 0x1}], 0x1) 20:12:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socketpair$unix(0x1, 0x10000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r2 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000001000)=ANY=[@ANYRES64], 0xffffff8a) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)) 20:12:56 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x3}}) [ 1279.272008] __nla_parse: 10 callbacks suppressed [ 1279.272019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1279.642854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:12:57 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41e34}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:57 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='security.selinux\x00', &(0x7f0000000000)="22aee7d00727c50c880389202d14f8cefdcf8cd6988021d0bc05dca665758a102084aedc63d502b0", 0x28, 0x0) 20:12:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1108b]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1279.848536] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:12:57 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff97}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:57 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x7400000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x7}, 0xff7f) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) write$binfmt_script(r2, &(0x7f00000002c0)={'#! ', './file0'}, 0xb) 20:12:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setxattr(0x0, 0x0, 0x0, 0x0, 0x0) write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000200)) [ 1280.144706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:12:57 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000280)='IPVS\x00', 0x5, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) close(r1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 20:12:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x402c542d, &(0x7f0000000040)) 20:12:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) fsetxattr$security_smack_entry(r1, 0x0, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x8000000000044000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) close(r0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 20:12:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) 20:12:58 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 1280.497330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1280.723815] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1280.880483] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:12:58 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc71e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 20:12:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9410010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1281.032254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:12:58 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4800000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1281.295745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:12:59 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x97ffffff00000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:12:59 executing program 0: r0 = socket$packet(0x11, 0x1000000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x12) sendmmsg(r0, &(0x7f0000004300)=[{{&(0x7f0000000080)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000002740)=[{0x10}], 0x10}}], 0x1, 0x0) 20:12:59 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$TIOCCBRK(r1, 0x5428) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040), 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000140)=@generic={0x3, 0x4bc7b0e2, 0x2}) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) fchdir(0xffffffffffffffff) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40980, 0x0) r6 = geteuid() fstat(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$fuse(0x0, &(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='fuse\x00', 0x110000, &(0x7f0000000480)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x7000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0xdc}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@uid_eq={'uid', 0x3d, r8}}, {@subj_role={'subj_role'}}]}}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) syz_open_procfs(0x0, &(0x7f0000000100)="737461746d007e69981892a4a4458c0548bc4539a0728b0689775d") memfd_create(&(0x7f0000000640)='blksize', 0x2) setrlimit(0x1, &(0x7f0000011000)) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r9) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) [ 1281.512305] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:12:59 executing program 0: syz_open_dev$loop(0x0, 0x0, 0x100082) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000300)={0xffffffffffffff91}, 0x7) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) ftruncate(0xffffffffffffffff, 0x8200) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000380)={0x0, r2}) 20:12:59 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, 0x0) 20:12:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9110010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:12:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/67, 0x43}}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1000000000002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000233) 20:12:59 executing program 5: 20:13:00 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x9effffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:00 executing program 5: 20:13:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf1100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf0ffffffffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:00 executing program 5: 20:13:00 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x7000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:00 executing program 0: 20:13:00 executing program 5: 20:13:00 executing program 0: 20:13:00 executing program 5: 20:13:00 executing program 0: 20:13:00 executing program 0: 20:13:01 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1f00}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:01 executing program 5: 20:13:01 executing program 0: 20:13:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6800}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc7100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:01 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x2000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:01 executing program 0: 20:13:01 executing program 5: 20:13:01 executing program 0: 20:13:01 executing program 5: 20:13:01 executing program 0: 20:13:01 executing program 5: [ 1284.518493] __nla_parse: 12 callbacks suppressed [ 1284.518505] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1284.681759] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1284.795149] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:02 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41e8a}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:02 executing program 0: 20:13:02 executing program 5: [ 1284.918549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:02 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110db]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1285.122044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:03 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661fb, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:03 executing program 0: 20:13:03 executing program 5: [ 1285.312893] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:03 executing program 5: 20:13:03 executing program 0: 20:13:03 executing program 5: 20:13:03 executing program 0: [ 1285.702978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1285.838962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1285.974687] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:03 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc51e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:03 executing program 5: 20:13:03 executing program 0: [ 1286.103646] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9510010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:04 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x66200, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:04 executing program 0: 20:13:04 executing program 5: 20:13:04 executing program 0: 20:13:04 executing program 5: 20:13:04 executing program 0: 20:13:04 executing program 5: 20:13:04 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x800000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:04 executing program 0: 20:13:04 executing program 5: 20:13:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f7f6}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8910010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:05 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661f2, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:05 executing program 5: 20:13:05 executing program 0: 20:13:05 executing program 5: 20:13:05 executing program 0: 20:13:05 executing program 5: 20:13:05 executing program 0: 20:13:06 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x500000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:06 executing program 5: 20:13:06 executing program 0: 20:13:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xad100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:06 executing program 5: 20:13:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6800000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:06 executing program 0: 20:13:06 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xeb610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:06 executing program 5: 20:13:06 executing program 5: 20:13:06 executing program 0: 20:13:06 executing program 0: 20:13:07 executing program 5: 20:13:07 executing program 0: 20:13:07 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7a00000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xbc10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1289.554665] __nla_parse: 17 callbacks suppressed [ 1289.554676] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:07 executing program 5: 20:13:07 executing program 0: 20:13:07 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1f00000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1289.834047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:07 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x8000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:07 executing program 5: 20:13:07 executing program 0: [ 1290.013710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:07 executing program 5: 20:13:07 executing program 0: 20:13:07 executing program 5: 20:13:07 executing program 0: [ 1290.377378] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1290.522114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1290.643025] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:08 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6c00000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:08 executing program 5: 20:13:08 executing program 0: 20:13:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11097]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1290.775761] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:08 executing program 5: [ 1291.052326] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:08 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x60000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:08 executing program 0: 20:13:08 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xe661060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1291.280638] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:08 executing program 5: 20:13:09 executing program 5: 20:13:09 executing program 0: 20:13:09 executing program 5: [ 1291.607969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:09 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x891e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:09 executing program 0: 20:13:09 executing program 5: 20:13:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x82100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:09 executing program 0: 20:13:09 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x200000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:09 executing program 5: 20:13:10 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:10 executing program 0: 20:13:10 executing program 5: 20:13:10 executing program 5: 20:13:10 executing program 0: 20:13:10 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4c00}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:10 executing program 5: 20:13:10 executing program 0: 20:13:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:10 executing program 5: 20:13:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x10) read(0xffffffffffffffff, 0x0, 0x0) 20:13:11 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfffff000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:11 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x400000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000080)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") recvmmsg(r2, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000440)}, 0x0) clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0) dup2(r0, r1) ioctl$VT_OPENQRY(r0, 0x5600, 0x0) 20:13:11 executing program 0: r0 = socket$inet(0xa, 0x400000000000801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 20:13:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x800000000000005}]}, 0x0, 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:13:12 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41e38}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:12 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:12 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:12 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1294.724646] __nla_parse: 15 callbacks suppressed [ 1294.724657] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:12 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x600000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:12 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f80b}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:12 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1294.942331] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1295.242056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1295.385383] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1295.511566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:13 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf0ffffffffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1295.644938] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:13 executing program 5: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:13 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) 20:13:13 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:13 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) [ 1295.985714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1296.220211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:13 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x9effffff, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:13 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f7f9}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:13 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) 20:13:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110b9]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1296.522828] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1296.721574] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:14 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 20:13:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xac10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:14 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:14 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:15 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x4c00, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xe82}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xba100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:15 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x2000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:15 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:16 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7"}) 20:13:16 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3f00, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:16 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7"}) 20:13:16 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff7f}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7"}) 20:13:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc6100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:16 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) r2 = dup2(r1, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x54, 0x0, &(0x7f0000000900)=[@increfs, @transaction_sg={0x40046307, {{0x0, 0x40486312, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 1299.112446] binder: 14003:14004 got reply transaction with no transaction stack [ 1299.127964] binder: 14003:14004 transaction failed 29201/-71, size 0-0 line 2741 [ 1299.170506] binder: 14003:14010 got reply transaction with no transaction stack [ 1299.178839] binder: 14003:14010 transaction failed 29201/-71, size 0-0 line 2741 [ 1299.187006] binder: undelivered TRANSACTION_ERROR: 29201 [ 1299.194466] binder: undelivered TRANSACTION_ERROR: 29201 20:13:17 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc31e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x1) ioctl$TIOCSBRK(0xffffffffffffffff, 0x40044591) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) fcntl$setflags(r0, 0x2, 0x800000100000000) socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r1 = memfd_create(&(0x7f0000d65000)='-ppp0#:)\x00', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r1, &(0x7f0000317000), 0x7f8) 20:13:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff7f]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:17 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) renameat2(r2, 0x0, r2, &(0x7f0000000100)='./file0/file1\x00', 0x0) prlimit64(0x0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:17 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @multicast2}, {}, 0x0, {0x2, 0x0, @remote}, "00000080000001000000007000"}) [ 1299.975911] __nla_parse: 14 callbacks suppressed [ 1299.975921] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:17 executing program 5: r0 = socket(0x2, 0x4001, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000040)=0x8001, 0x4) connect$unix(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="8202000000006c6530002bb00ed7cc39a644b4a49578cb6b2a7d8700945e61fc5866c7b3a75c319f75ee7f379f7d03f3327f20f66cac0b7aa9a4122cfaf27ddf9c3953cf20f3f5bfa8b6a105ce7f49df"], 0x1) 20:13:17 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661eb, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:17 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf9f70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1300.160220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:17 executing program 5: r0 = socket$unix(0x1, 0x1000000000002, 0x0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="01018000000000000000"], 0x1) 20:13:17 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/67, 0x43}}], 0x1, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000233) 20:13:18 executing program 5: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 20:13:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xed100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1300.506520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1300.844328] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1301.076826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:18 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x311e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:18 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:18 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x630d, {0x40406301, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 20:13:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8c100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1301.224353] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:18 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1301.287729] binder: 14098:14099 got reply transaction with no transaction stack 20:13:19 executing program 5: [ 1301.328265] binder: 14098:14099 transaction failed 29201/-71, size 0-0 line 2741 [ 1301.341580] binder: undelivered TRANSACTION_ERROR: 29201 [ 1301.524336] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:19 executing program 5: 20:13:19 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf661060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:19 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf7f7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1301.722605] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:19 executing program 5: 20:13:19 executing program 5: 20:13:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fcntl$setstatus(r4, 0x4, 0x40400) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) write$cgroup_type(r1, &(0x7f00000001c0)='threaded\x00', 0xfffffffffffffe53) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) [ 1302.321183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:20 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:20 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, &(0x7f0000001640), 0x80000008, &(0x7f0000000180)) timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000e04000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) 20:13:20 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11081]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:20 executing program 5: setpriority(0x0, 0x0, 0x8) 20:13:20 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x400c920a, 0x8150000) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) 20:13:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000240)={@remote}, 0x14) [ 1302.784484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11090]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:21 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000680)={0xa, 0xe21}, 0x1c) syz_emit_ethernet(0x423, &(0x7f0000000200)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @dccp={{0x0, 0x4e21, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, "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"}}}}}, 0x0) 20:13:21 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x300000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:21 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:21 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf961060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1f00000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:21 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:21 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={"766574eb0180d3200000000000000040", 0x43732e5398417f1a}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000140)='sit0\x00') 20:13:21 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f00000009c0)=[{0x0}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f00000005c0)=""/214, 0xd6}, {&(0x7f00000006c0)=""/194, 0xc2}, {&(0x7f00000007c0)=""/146, 0x92}, {&(0x7f0000000880)=""/144, 0x90}, {&(0x7f0000000480)=""/13, 0xd}, {&(0x7f0000000940)=""/71, 0x47}], 0x8, 0x0) 20:13:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0x51, @time}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0x404c534a, &(0x7f0000000080)) r1 = gettid() timer_create(0x0, &(0x7f0000000500)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 20:13:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 20:13:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110be]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:22 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = gettid() fcntl$setown(r1, 0x8, r2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0x8000000a4002960) open(&(0x7f0000000040)='./control\x00', 0x0, 0x0) 20:13:22 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xeb61060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x10000000141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r1, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getpgid(0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 20:13:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x2088ffffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc810010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1305.043978] __nla_parse: 9 callbacks suppressed [ 1305.043989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:22 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x200000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:22 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:22 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8000, 0x0) clock_gettime(0x0, 0x0) r0 = inotify_init() dup(r0) ioctl$VT_WAITACTIVE(r0, 0x5607) add_key$user(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f00000000c0)=""/2, 0x0) fstat(r0, &(0x7f0000000a40)) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x800000100008, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000000)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) sendfile(r2, r2, &(0x7f0000000000)=0x2000, 0x2000005) [ 1305.325523] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11086]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:23 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x8000, 0x0) clock_gettime(0x0, 0x0) r0 = inotify_init() dup(r0) ioctl$VT_WAITACTIVE(r0, 0x5607) add_key$user(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x21, &(0x7f00000000c0)=""/2, 0x0) fstat(r0, &(0x7f0000000a40)) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r3 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) r4 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x800000100008, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000000)) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) sendfile(r2, r2, &(0x7f0000000000)=0x2000, 0x2000005) 20:13:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0), 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@multicast1, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001e80)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004700)) geteuid() getresgid(&(0x7f0000004740), &(0x7f0000004780), &(0x7f00000047c0)) gettid() getuid() getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004880)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000004980)=0xe8) getgroups(0x2, &(0x7f00000049c0)=[0x0, 0xee00]) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000004a00)) geteuid() lstat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004b40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000004c40)=0xe8) stat(&(0x7f0000005480)='./file1\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d40)={{{@in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000004f00)) stat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005000), &(0x7f0000005040)=0xc) getresgid(&(0x7f0000005080), &(0x7f00000050c0), &(0x7f0000005100)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000000840)=@proc={0x10, 0x0, 0x25dfdbfd, 0x200}, 0xc, &(0x7f0000004680)=[{&(0x7f0000000740)=ANY=[@ANYBLOB="10000000000000002cbd7000000110226b19172c26316a2e22b5f65fd70e38ea33a63d3c8c3a248dab05390dd9751867cf000014000000000000000000"], 0x1}], 0x1, 0x0, 0x0, 0x804}, 0x8000) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000380)) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffffff}, 0x30) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ffff0000fffffffffeffffffc0ffffffffffffff000000000000000004000000000000000000000000000000000000000000000000000000000000000700000008000000060000000000000005000000000000000000000000000000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$FIGETBSZ(r3, 0x2, &(0x7f00000002c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x1ff) r5 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f00000000c0)=0x400, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)=0x1) dup3(r0, r5, 0x80000) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 1305.626331] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11089]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1305.834901] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:23 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1306.067646] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:24 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xec61060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:24 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfbf70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000004c0), 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f00000008c0)=0xc) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@multicast1, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000001e80)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004700)) geteuid() getresgid(&(0x7f0000004740), &(0x7f0000004780), &(0x7f00000047c0)) gettid() getuid() getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004880)={{{@in=@broadcast, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000004980)=0xe8) getgroups(0x2, &(0x7f00000049c0)=[0x0, 0xee00]) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000004a00)) geteuid() lstat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000004b40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000004c40)=0xe8) stat(&(0x7f0000005480)='./file1\x00', &(0x7f00000054c0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004d40)={{{@in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004e80), &(0x7f0000004ec0)=0xc) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000004f00)) stat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) getpgrp(0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000005000), &(0x7f0000005040)=0xc) getresgid(&(0x7f0000005080), &(0x7f00000050c0), &(0x7f0000005100)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005280)={&(0x7f0000000840)=@proc={0x10, 0x0, 0x25dfdbfd, 0x200}, 0xc, &(0x7f0000004680)=[{&(0x7f0000000740)=ANY=[@ANYBLOB="10000000000000002cbd7000000110226b19172c26316a2e22b5f65fd70e38ea33a63d3c8c3a248dab05390dd9751867cf000014000000000000000000"], 0x1}], 0x1, 0x0, 0x0, 0x804}, 0x8000) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, &(0x7f0000000380)) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000280)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffffff}, 0x30) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000500)=ANY=[@ANYBLOB="0000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ffff0000fffffffffeffffffc0ffffffffffffff000000000000000004000000000000000000000000000000000000000000000000000000000000000700000008000000060000000000000005000000000000000000000000000000ff0f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$FIGETBSZ(r3, 0x2, &(0x7f00000002c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x1ff) r5 = accept4(r1, 0x0, &(0x7f0000000040), 0x0) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f00000000c0)=0x400, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)=0x1) dup3(r0, r5, 0x80000) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 1306.511683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a00000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:24 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc01e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1306.796011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1307.011993] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:24 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:24 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:25 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:25 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x7, 0x300) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x36) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mq_open(&(0x7f0000000000)='-$\x00', 0x0, 0x0, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/37, 0x25}], 0x21, 0x0) 20:13:25 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup2(r1, r0) 20:13:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) clone(0x3103001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) readv(r0, 0x0, 0x0) pause() [ 1307.584107] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:25 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x62060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1307.934516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:25 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xbb100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:25 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4800}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:25 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:26 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:26 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1200000000000003, 0x0, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000000004, 0x400031, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="15699de7e0a36d180100d211799bb6f595ed015e5092deee94b4b6b7d165e47d6dc21a20c7788ea0da4745034dc36aef27e41c3475cf6e03fa72e2ff93733635c8a2b15cbcd5b6d634e55f411250619e0154efb8043e3d7cfe6b6955fea50987d75e536079cb7f2d21064c3e27abb1d5c9a7a5e92d916ce6bad6fa507eff3356c0a88be41f087659f1d30731e7cb1abfea9a00507aa671a8199183c671e4917b28a2aa70fc31a4ed2288659cf2a94dfe9f560c637d281a73d2c10970d16a9c99deef6745cd902a9fa4585b3679e6604ede332696f90ef5b16fd4c5934f9003000000000000008a30806f0159bc8339be165f6900") getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000000040)) 20:13:26 executing program 0: syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:26 executing program 5: 20:13:26 executing program 5: 20:13:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110e0]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:26 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf1610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:26 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x10}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:26 executing program 5: 20:13:27 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe9100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:27 executing program 5: 20:13:27 executing program 0: clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:27 executing program 5: 20:13:27 executing program 5: 20:13:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001a80)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001a40)=[{&(0x7f00000001c0)={0x84, 0x3f, 0x132, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x74, 0x48, [@generic="773cdb45bfb41923154e71c7dbf69aa4cadc839975264524c1fc85e855b738c1dee098a011af7dadb90a83331e78811f49cb71ac96e4e989a4f7e2ad6ae50452112a1480bb7e93505a17555b98cc4a520026884bf1ab7e218fc40613dee35f6094b5157ca1936c01d4d8b74a1d"]}]}, 0x84}, {&(0x7f0000001680)={0x10}, 0x10}], 0x2, 0x0, 0x0, 0x4800}, 0x80) 20:13:27 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f000000b100), 0x1000) 20:13:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf1f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979843b3355236be93426485f99f87998f48ad7ffa29bda080d701b70d252407218fad612e074583416711ec1053ba40f26809a95171a9") ioctl$EXT4_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000100)=0x20004010) [ 1310.128878] __nla_parse: 8 callbacks suppressed [ 1310.128892] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1310.270181] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:28 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661e7, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1310.450813] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:28 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfdffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:28 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x41000000000467fd) readv(r0, &(0x7f0000000140)=[{0x0}, {&(0x7f00000001c0)=""/129, 0x81}], 0x2) [ 1310.614013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:28 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x30000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x40000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:28 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000000e000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000040)="6bae12ae00b880008ec8f30f2353660f6fea670f0fcfb6ba4200ec64f40f06ba420066b8df1301dc66efbad10466b8ca00000066ef", 0x35}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 1310.810919] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:28 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') 20:13:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) [ 1311.115139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) readahead(r0, 0x1, 0x0) 20:13:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f000000bf40)=[{{&(0x7f0000000a40)=@l2, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 20:13:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2, 0xf, 0x0, 0x8, 0x6, 0x0, 0x70bd27, 0x25dfdbfc, [@sadb_lifetime={0x4, 0x6, 0x26b, 0x4, 0x8, 0x9}]}, 0x30}}, 0x4004000) ioctl(0xffffffffffffffff, 0x0, 0x0) [ 1311.437795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1311.638638] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:29 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)="6664696e666f2f3400693cc9670810815383d4110b1f791903df23383f9af0f764da25ecbf289bc801000000000000000d163bf85c3ed80000") r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000040)={0x0, 0x6, 0x1, 0x0, 0x3, 0x1}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) write$binfmt_script(r1, &(0x7f0000002580)=ANY=[@ANYBLOB="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"], 0x109a) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0xfffffffffffffef6) r5 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000600)='trusted.overlay.redirect\x00', &(0x7f0000000640)='./file0\x00', 0x8, 0x3) r6 = memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x0, "0f754ee708495822"}) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x23, 0xffffffffffffffff, @thr={&(0x7f0000000680)="8aa1baf0bef4d34b0d4c358fa1837873a011afd540e52d05a91c993bd2ddfa7d1d03e1070422e357dc37e81a09590a8a03fe6b3254e88596dbd868bba2c874b525c8e0c5a9c72b4efb7726864f826fa3ce6ca10826073d74c8abbf80dc755c7643c4ff350b0d0d34145cef7f54bc83138524b08acf0dc4f4c3f16fe42e061524a2ae32fb0fdd441add008eac642c216db7909f3a6b57951b0fc40d1565916f9e6d843d0268fcb6d5bffc12e0f30659c5537fff", 0x0}}, 0x0) timer_delete(0x0) ftruncate(r6, 0x1400001) sendfile(r5, r6, &(0x7f0000000180)=0xf10001, 0xfffffdef) timer_delete(0x0) write(r4, &(0x7f00000003c0)="f2788d033f5b38a94b898bf514a15e7df08843de0271bb1b2d50c2a9c0c829a83f0086779a2ecdbd0f86285e763c5cb3bd25619fa731ccea424f4e5c3d23180d44b1fabd244a31f61afc7d4ad196f8ddba2c12ac6fb42bac5eb2ddfeb89798fa49eb402bd8cccc7388", 0x69) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000140)={0x2, &(0x7f00000000c0)=[{}, {}]}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000340)) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000300)={0x5, 0x7, 0x10001, 0x4}) [ 1311.809595] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc3ffffff]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:29 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x4c, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1311.979169] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:29 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41ec0}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:29 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7400000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:29 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xf0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0xdc, 0x0, [@generic="7cdc32b2fc05af65376da61b7739a8735db418a6c70e08cec5cae801edb119ab2dfff448264097487495ec685f246d55bef496097138f4d31e3b4757f842fe73d506757f3a79311cc5c02c52ca5f22e8c6a42b9e8c499e18375f1b189c42a34903bc84f8f9caa8d48fb9db3145a9292539c0bb4c8b6bc9e3fef4c02dab8ae59cf51bdf63bce2fd503d0e3a23918b6b164ee92a3119d3cd16731ac33fe05509a34b5961d2da349a4dafbbb0c90feaf3182bdf24b242cfd8e461d7f6d27e04d88de8462dba85302ef9aed4caf8af56ca070978f4e65fcca4c4"]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x841}, 0x4000800) 20:13:29 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:30 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) read(r0, &(0x7f0000000240)=""/28, 0x1c) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) stat(0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={'lo\x00', 0x101}) sendto$inet(r0, &(0x7f0000000480)="4fe2bafbefc760d161dc2535397dfffc4bb7b528026b81cac3018d1699ab2a68a883995fbd2f5f0683030a2b44ea95abe1bf171ea9e32e3405f12908003749ced916eb1414efb41f7c927241b2be17a361c070fe6f9690a3", 0x58, 0x1, 0x0, 0x0) 20:13:30 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:30 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:30 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:30 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110ed]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:31 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xffffff7f00000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:31 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:31 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x600}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) r1 = memfd_create(&(0x7f0000000080)="c8a8707470", 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}]) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) 20:13:31 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x74}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x7, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) 20:13:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000140), 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 20:13:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:31 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:32 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:32 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf6610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:32 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f00000045c0)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x1, @mcast1}, 0x80, 0x0, 0x0, &(0x7f0000000280)=[{0xc}], 0xc, 0x8090}, 0x8}], 0x1, 0x0) 20:13:32 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:32 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:32 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf6f70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffffff00000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1315.515629] __nla_parse: 11 callbacks suppressed [ 1315.515639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:33 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xda10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1316.171799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:34 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:34 executing program 5: wait4(0x0, 0x0, 0xe1000006, 0x0) [ 1316.522909] IPVS: ftp: loaded support on port[0] = 21 [ 1316.562458] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1316.572372] IPVS: ftp: loaded support on port[0] = 21 [ 1316.775066] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:34 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x6c00, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xaa100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1317.034199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:34 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x30000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd5100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1317.376694] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:35 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf30a0000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1317.644846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1317.841725] device bridge_slave_1 left promiscuous mode [ 1317.865906] bridge0: port 2(bridge_slave_1) entered disabled state [ 1317.928813] device bridge_slave_0 left promiscuous mode [ 1317.934513] bridge0: port 1(bridge_slave_0) entered disabled state [ 1318.027211] team0 (unregistering): Port device team_slave_1 removed [ 1318.040883] team0 (unregistering): Port device team_slave_0 removed [ 1318.053524] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1318.112513] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1318.175313] bond0 (unregistering): Released all slaves [ 1318.254834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:35 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1318.541610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1318.900423] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:36 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8c10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:36 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x4000000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1320.446875] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.460618] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.469174] device bridge_slave_0 entered promiscuous mode [ 1320.479764] bridge0: port 1(bridge_slave_0) entered blocking state [ 1320.486978] bridge0: port 1(bridge_slave_0) entered disabled state [ 1320.496792] device bridge_slave_0 entered promiscuous mode [ 1320.559664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1320.566309] bridge0: port 2(bridge_slave_1) entered disabled state [ 1320.575818] device bridge_slave_1 entered promiscuous mode [ 1320.590581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1320.597143] bridge0: port 2(bridge_slave_1) entered disabled state [ 1320.605193] device bridge_slave_1 entered promiscuous mode [ 1320.654938] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1320.684979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1320.711583] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1320.735913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1320.864059] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1320.889171] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1320.918084] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1320.941645] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1321.158863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1321.166721] team0: Port device team_slave_0 added [ 1321.195413] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1321.203467] team0: Port device team_slave_0 added [ 1321.215029] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1321.223105] team0: Port device team_slave_1 added [ 1321.251224] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1321.259357] team0: Port device team_slave_1 added [ 1321.269597] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1321.314648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1321.332001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1321.370064] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1321.386274] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1321.393672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1321.411023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1321.423418] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1321.430819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1321.447375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1321.461600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1321.468898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1321.488801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1321.506551] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1321.526120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1321.537806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1322.079706] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.086144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.093005] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.099467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.107350] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1322.116909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.123450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.131811] bridge0: port 1(bridge_slave_0) entered blocking state [ 1322.138293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.146474] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1322.688005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1322.701385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1324.128173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1324.141528] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1324.308040] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1324.324096] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1324.483188] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1324.489607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1324.500196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1324.518588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1324.529203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1324.537203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1324.692471] 8021q: adding VLAN 0 to HW filter on device team0 [ 1324.707674] 8021q: adding VLAN 0 to HW filter on device team0 20:13:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe910010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:43 executing program 5: 20:13:43 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:43 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7a00}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:43 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:43 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x2088ffffffff, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1325.933248] __nla_parse: 3 callbacks suppressed [ 1325.933259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:43 executing program 5: 20:13:43 executing program 5: 20:13:43 executing program 5: 20:13:43 executing program 5: 20:13:43 executing program 5: [ 1326.275795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd0100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000140), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000100), 0x0, 0x2}, 0x20) 20:13:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x8031, 0xffffffffffffffff, 0x0) [ 1326.623197] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1326.886872] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:44 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:44 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41e30}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:44 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1327.076270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x667, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000740)="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", 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000003600)=ANY=[], 0x0, 0x200400d4}, 0x4000) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='memory.low\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) dup3(r0, r0, 0x80000) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3d, 0x0, &(0x7f0000000240)) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000140)=@mpls_getnetconf={0x14, 0x52, 0x868982dd5c21e331}, 0x14}}, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/134, 0x86}], 0x1, &(0x7f0000000940)=""/138, 0x8a}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003580)=[{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)}], 0x1, 0x0, 0x0, 0x40}], 0x1, 0x800) r2 = socket$inet6(0xa, 0x8080000000000003, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:13:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf4100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:44 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x1620600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:44 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1327.292434] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:45 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:45 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:45 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x667, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000740)="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", 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000003600)=ANY=[], 0x0, 0x200400d4}, 0x4000) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='memory.low\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) dup3(r0, r0, 0x80000) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3d, 0x0, &(0x7f0000000240)) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000140)=@mpls_getnetconf={0x14, 0x52, 0x868982dd5c21e331}, 0x14}}, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/134, 0x86}], 0x1, &(0x7f0000000940)=""/138, 0x8a}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003580)=[{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)}], 0x1, 0x0, 0x0, 0x40}], 0x1, 0x800) r2 = socket$inet6(0xa, 0x8080000000000003, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:13:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x667, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000740)="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", 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000003600)=ANY=[], 0x0, 0x200400d4}, 0x4000) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='memory.low\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) dup3(r0, r0, 0x80000) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3d, 0x0, &(0x7f0000000240)) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000140)=@mpls_getnetconf={0x14, 0x52, 0x868982dd5c21e331}, 0x14}}, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/134, 0x86}], 0x1, &(0x7f0000000940)=""/138, 0x8a}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003580)=[{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)}], 0x1, 0x0, 0x0, 0x40}], 0x1, 0x800) r2 = socket$inet6(0xa, 0x8080000000000003, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 1327.740584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x74000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1328.035570] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1328.226371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:46 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xe4ffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1328.400387] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:46 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7a}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x667, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) clock_gettime(0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000740)="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", 0x3) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000003600)=ANY=[], 0x0, 0x200400d4}, 0x4000) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='memory.low\x00', 0x2, 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) dup3(r0, r0, 0x80000) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f00000004c0), &(0x7f0000000500)=0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x3d, 0x0, &(0x7f0000000240)) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000140)=@mpls_getnetconf={0x14, 0x52, 0x868982dd5c21e331}, 0x14}}, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000680)=""/134, 0x86}], 0x1, &(0x7f0000000940)=""/138, 0x8a}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003580)=[{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000033c0)}], 0x1, 0x0, 0x0, 0x40}], 0x1, 0x800) r2 = socket$inet6(0xa, 0x8080000000000003, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 20:13:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:46 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xff0f0000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:46 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:46 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20000002d) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@remote, @remote, @local, 0x0, 0x0, 0x0, 0xfb}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x9) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x21, r0, 0x0, 0x0) 20:13:46 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000002c0)) symlinkat(&(0x7f0000000340)='./file0\x00', r2, &(0x7f0000000680)='./file0\x00') set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)={0x2a, 0x4, 0x0, {0x1, 0xbe, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52d30fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="da4011289be44845084d057497ad96046d7e39df317d25b056f2717be2aa41208092d1313190ef285cdc968ec49ed179b048f1a86b9424e92f5d5d0a92cbcfb065a6552df9b664cd64645469fdec9423f36882427ddbb66dfb38540365d49315eaa6be128e809da75cf013"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) ioctl$TCSBRKP(r2, 0x5425, 0x5) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r2, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x13) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) fcntl$setflags(r0, 0x2, 0x0) 20:13:46 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:46 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd0100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110d9]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:47 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfdf7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:47 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:47 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd5100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:47 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3f000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9710010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:48 executing program 5: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:13:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x40000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:48 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff97}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:48 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:48 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfaf7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1331.127198] __nla_parse: 10 callbacks suppressed [ 1331.127211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:49 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7400000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1331.367615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x200000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1331.632763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 20:13:49 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x90010000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:49 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:49 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff97}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1331.887753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:49 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x100082) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xdb100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1332.213141] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1332.406041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6c]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1332.580510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 20:13:50 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff97}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1332.799645] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:50 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:50 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1333.091877] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:50 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf2f7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1333.304779] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:51 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc41e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:51 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:51 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x5000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x18000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:51 executing program 5: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:51 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000540)) prlimit64(0x0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:51 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf4f70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:52 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4c}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:52 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661f7, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x90]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:52 executing program 5: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf4610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:52 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, 0x0) prlimit64(r1, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xdd10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:53 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xfe61060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:53 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) prlimit64(0x0, 0xd, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:53 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xff0f}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf510010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1336.132826] __nla_parse: 11 callbacks suppressed [ 1336.132839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:53 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd310010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:54 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41ec3}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1336.370602] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) getpeername$inet(r0, &(0x7f0000000380)={0x2, 0x0, @multicast2}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff00fa32000000000000000000080015000000000008000000f66f1bfe"], 0x24}}, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0xb8, 0xf, 0x4, 0x404, 0x70bd2a, 0x25dfdbfb, {0x3}, [@typed={0x8, 0xb, @pid=r2}, @typed={0x8, 0x40, @pid=r3}, @nested={0x94, 0x60, [@typed={0x90, 0x4b, @binary="3884820ecd8a0680186f0287676a7ac2993bd67773e259646bc8a59f5ef9dd95245fc5a5f10f76c964ce6d58799ffba1ac4ad17155e39966ad8553d32be487530f4474d7abd5c1d38e3392242e4697163447635d04fb023dbacf6eca3d3b1ffe7cb49ccccaaf776385cba30da0e11c0dfb4c58b14be71d1ad4f5bded8bd13e1102461e6b398720e7f088e2"}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x20008010) [ 1336.645159] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:54 executing program 5: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3400070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000140)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000000000000000000000080015000000000008000000f66f1bfe"], 0x24}}, 0x0) 20:13:54 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, &(0x7f0000000580)={0x7fff, 0xcb}, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:54 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, &(0x7f0000000600)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:54 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110d6]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1337.170824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1337.536560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:55 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf261060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:55 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(0x0, &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1337.946944] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:55 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffffff88200000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:55 executing program 5: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3400070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000140)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000000000000000000000080015000000000008000000f66f1bfe"], 0x24}}, 0x0) 20:13:55 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf0ffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:55 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc310010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:55 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(0x0, &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) [ 1338.184039] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1338.542565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:56 executing program 5: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3400070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000140)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000000000000000000000080015000000000008000000f66f1bfe"], 0x24}}, 0x0) [ 1338.853505] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa510010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:56 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:56 executing program 5: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(0x0, &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x1) 20:13:56 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x9effffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1339.231773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:57 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x30, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd410010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:57 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f808}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:57 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(0x0, 0x1) 20:13:57 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(0x0, 0x1) 20:13:57 executing program 5: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3400070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000140)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000000000000000000000080015000000000008000000f66f1bfe"], 0x24}}, 0x0) 20:13:57 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:58 executing program 5: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3400070003000100000000000000000000000000000025000000000000000000000000000000200000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000140)=0x8) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000000000000000000000080015000000000008000000f66f1bfe"], 0x24}}, 0x0) 20:13:58 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000500)=[{&(0x7f0000000300)=""/146, 0x92}, {&(0x7f00000003c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/34, 0x22}], 0x3, 0x0, 0x0, 0x6}, 0x7f}, {{&(0x7f0000000540), 0x80, &(0x7f0000000880)=[{&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f0000000680)=""/151, 0x97}, {&(0x7f0000000740)}, {&(0x7f0000000780)=""/217, 0xd9}], 0x4, &(0x7f00000008c0)=""/194, 0xc2, 0xb901}, 0x4}, {{&(0x7f00000009c0)=@un=@abs, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/64, 0x40}, {&(0x7f0000000a80)=""/111, 0x6f}, {&(0x7f0000000b00)=""/110, 0x6e}], 0x3, &(0x7f0000000bc0)=""/236, 0xec, 0x3f}, 0x5}, {{&(0x7f0000000cc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003000)=[{&(0x7f0000000d40)=""/115, 0x73}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/5, 0x5}, {&(0x7f0000002f00)=""/193, 0xc1}], 0x5, &(0x7f0000003080)=""/245, 0xf5}, 0x5ddb1db7}, {{&(0x7f0000003180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004240)=""/149, 0x95}, {&(0x7f0000004300)}, {&(0x7f0000004340)=""/57, 0x39}], 0x4, &(0x7f0000004400)=""/3, 0x3}, 0xfffffffffffffff9}, {{&(0x7f0000004440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005ac0)=[{&(0x7f00000044c0)=""/144, 0x90}, {&(0x7f0000004580)=""/193, 0xc1}, {&(0x7f0000004700)=""/228, 0xe4}, {&(0x7f0000004800)=""/49, 0x31}, {&(0x7f0000004840)=""/111, 0x6f}, {&(0x7f00000048c0)=""/209, 0xd1}, {&(0x7f00000049c0)=""/176, 0xb0}], 0x7, 0x0, 0x0, 0xfffffffffffff4cf}}, {{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200)=[{&(0x7f0000005c00)=""/217, 0xd9}, {&(0x7f0000005d00)=""/198, 0xc6}, {&(0x7f0000005e00)=""/213, 0xd5}, {&(0x7f0000005f00)=""/171, 0xab}, {&(0x7f0000005fc0)=""/235, 0xeb}, {&(0x7f00000060c0)=""/132, 0x84}, {&(0x7f0000006180)=""/112, 0x70}], 0x7, &(0x7f0000006280)=""/4096, 0x1000, 0x100000001}}, {{&(0x7f0000007280)=@nfc, 0x80, &(0x7f0000007400)=[{&(0x7f0000007300)=""/149, 0x95}, {&(0x7f00000073c0)=""/14, 0xe}], 0x2, 0x0, 0x0, 0x4}}], 0x8, 0x1, &(0x7f0000007640)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000240)={r3, 0x1, 0x6, @remote}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r4, &(0x7f00000000c0)=@known='user.syz\x00') r5 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20800) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r0, r5}) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0185649, &(0x7f0000000140)={0xa30000, 0x7, 0x1, [], &(0x7f0000000100)={0x9a090d, 0x4, [], @ptr=0x5}}) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000429d17db524e494b00080015000000000008000000f66f1bfe"], 0x24}}, 0x0) 20:13:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:13:58 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:13:59 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x351e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1341.314823] __nla_parse: 5 callbacks suppressed [ 1341.314834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:13:59 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x68000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:59 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1341.551516] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:13:59 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1f8030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:13:59 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) gettid() recvmmsg(0xffffffffffffffff, &(0x7f0000007440)=[{{&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000500)=[{&(0x7f0000000300)=""/146, 0x92}, {&(0x7f00000003c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/34, 0x22}], 0x3, 0x0, 0x0, 0x6}, 0x7f}, {{&(0x7f0000000540), 0x80, &(0x7f0000000880)=[{&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f0000000680)=""/151, 0x97}, {&(0x7f0000000740)}, {&(0x7f0000000780)=""/217, 0xd9}], 0x4, &(0x7f00000008c0)=""/194, 0xc2, 0xb901}, 0x4}, {{&(0x7f00000009c0)=@un=@abs, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/64, 0x40}, {&(0x7f0000000a80)=""/111, 0x6f}, {&(0x7f0000000b00)=""/110, 0x6e}], 0x3, &(0x7f0000000bc0)=""/236, 0xec, 0x3f}, 0x5}, {{&(0x7f0000000cc0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003000)=[{&(0x7f0000000d40)=""/115, 0x73}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000002dc0)=""/233, 0xe9}, {&(0x7f0000002ec0)=""/5, 0x5}, {&(0x7f0000002f00)=""/193, 0xc1}], 0x5, &(0x7f0000003080)=""/245, 0xf5}, 0x5ddb1db7}, {{&(0x7f0000003180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004240)=""/149, 0x95}, {&(0x7f0000004300)}, {&(0x7f0000004340)=""/57, 0x39}], 0x4, &(0x7f0000004400)=""/3, 0x3}, 0xfffffffffffffff9}, {{&(0x7f0000004440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005ac0)=[{&(0x7f00000044c0)=""/144, 0x90}, {&(0x7f0000004580)=""/193, 0xc1}, {&(0x7f0000004700)=""/228, 0xe4}, {&(0x7f0000004800)=""/49, 0x31}, {&(0x7f0000004840)=""/111, 0x6f}, {&(0x7f00000048c0)=""/209, 0xd1}, {&(0x7f00000049c0)=""/176, 0xb0}], 0x7, 0x0, 0x0, 0xfffffffffffff4cf}}, {{&(0x7f0000005b80)=@nfc_llcp, 0x80, &(0x7f0000006200)=[{&(0x7f0000005c00)=""/217, 0xd9}, {&(0x7f0000005d00)=""/198, 0xc6}, {&(0x7f0000005e00)=""/213, 0xd5}, {&(0x7f0000005f00)=""/171, 0xab}, {&(0x7f0000005fc0)=""/235, 0xeb}, {&(0x7f00000060c0)=""/132, 0x84}, {&(0x7f0000006180)=""/112, 0x70}], 0x7, &(0x7f0000006280)=""/4096, 0x1000, 0x100000001}}, {{&(0x7f0000007280)=@nfc, 0x80, &(0x7f0000007400)=[{&(0x7f0000007300)=""/149, 0x95}, {&(0x7f00000073c0)=""/14, 0xe}], 0x2, 0x0, 0x0, 0x4}}], 0x8, 0x1, &(0x7f0000007640)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000240)={r3, 0x1, 0x6, @remote}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eeaf000ee9a90f798058439ed554fa07424ada75af1f02ac06edbcd7a071fb35331ce39c5a00000000") fsetxattr(r4, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) fremovexattr(r4, &(0x7f00000000c0)=@known='user.syz\x00') r5 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20800) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r0, r5}) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0185649, &(0x7f0000000140)={0xa30000, 0x7, 0x1, [], &(0x7f0000000100)={0x9a090d, 0x4, [], @ptr=0x5}}) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000429d17db524e494b00080015000000000008000000f66f1bfe"], 0x24}}, 0x0) 20:13:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000000301ffff000000000000000000000000080015000000000008000000f66f1bfe"], 0x24}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 20:13:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8b100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1341.815287] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:13:59 executing program 0 (fault-call:5 fault-nth:0): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1342.385955] FAULT_INJECTION: forcing a failure. [ 1342.385955] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.398068] CPU: 1 PID: 16115 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #264 [ 1342.405472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.414863] Call Trace: [ 1342.417505] dump_stack+0x244/0x39d [ 1342.421189] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1342.426424] ? trace_hardirqs_on+0xbd/0x310 [ 1342.430797] ? kasan_check_read+0x11/0x20 [ 1342.434984] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1342.440976] should_fail.cold.4+0xa/0x17 [ 1342.445059] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1342.450178] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1342.455299] ? rcu_preempt_deferred_qs_irqrestore+0x8a5/0x1000 [ 1342.461300] ? zap_class+0x640/0x640 [ 1342.465042] ? note_gp_changes+0x470/0x470 [ 1342.469347] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1342.474126] ? find_held_lock+0x36/0x1c0 [ 1342.478221] ? perf_trace_sched_process_exec+0x860/0x860 [ 1342.483707] __should_failslab+0x124/0x180 [ 1342.487972] should_failslab+0x9/0x14 [ 1342.491814] kmem_cache_alloc+0x2be/0x730 [ 1342.495992] ? __might_sleep+0x95/0x190 [ 1342.499989] ? sock_destroy_inode+0x60/0x60 [ 1342.504330] sock_alloc_inode+0x1d/0x260 [ 1342.508460] ? sock_destroy_inode+0x60/0x60 [ 1342.512852] alloc_inode+0x63/0x190 [ 1342.516536] new_inode_pseudo+0x71/0x1a0 [ 1342.520639] ? prune_icache_sb+0x1c0/0x1c0 [ 1342.524913] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1342.529888] sock_alloc+0x41/0x270 [ 1342.533458] __sock_create+0x175/0x930 [ 1342.537400] ? kernel_sock_ip_overhead+0x570/0x570 [ 1342.542375] ? __sb_end_write+0xd9/0x110 [ 1342.546468] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1342.552028] __sys_socket+0x106/0x260 [ 1342.555862] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1342.560496] ? move_addr_to_kernel+0x70/0x70 [ 1342.564933] ? entry_SYSENTER_compat+0x70/0x7f [ 1342.569533] ? trace_hardirqs_off_caller+0x310/0x310 [ 1342.574657] __ia32_sys_socket+0x73/0xb0 [ 1342.578731] do_fast_syscall_32+0x34d/0xfb2 [ 1342.583074] ? do_int80_syscall_32+0x890/0x890 [ 1342.587669] ? entry_SYSENTER_compat+0x68/0x7f [ 1342.592274] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1342.597378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1342.602267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1342.607134] ? trace_hardirqs_on_caller+0x310/0x310 [ 1342.612182] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1342.617244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1342.622284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1342.627166] entry_SYSENTER_compat+0x70/0x7f [ 1342.631586] RIP: 0023:0xf7efea29 [ 1342.634970] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1342.653882] RSP: 002b:00000000f5efa0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000167 [ 1342.661614] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 1342.668889] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1342.676183] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1342.683502] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1342.690789] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1342.706004] socket: no more sockets 20:14:00 executing program 5 (fault-call:1 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1342.744735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:00 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x97ffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11085]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x125d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1343.057926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:00 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf0ffffff, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:00 executing program 0 (fault-call:5 fault-nth:1): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1343.245583] FAULT_INJECTION: forcing a failure. [ 1343.245583] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.259396] CPU: 1 PID: 16152 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #264 [ 1343.266825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.276214] Call Trace: [ 1343.278839] dump_stack+0x244/0x39d [ 1343.282520] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1343.287753] ? __kernel_text_address+0xd/0x40 [ 1343.292295] should_fail.cold.4+0xa/0x17 [ 1343.296402] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1343.301549] ? save_stack+0xa9/0xd0 [ 1343.305212] ? save_stack+0x43/0xd0 [ 1343.308889] ? kasan_kmalloc+0xc7/0xe0 [ 1343.312813] ? kasan_slab_alloc+0x12/0x20 [ 1343.317007] ? kmem_cache_alloc+0x12e/0x730 [ 1343.321364] ? sock_alloc_inode+0x1d/0x260 [ 1343.325643] ? alloc_inode+0x63/0x190 [ 1343.329484] ? new_inode_pseudo+0x71/0x1a0 [ 1343.333761] ? __sock_create+0x175/0x930 [ 1343.337865] ? __sys_socket+0x106/0x260 [ 1343.341895] ? __ia32_sys_socket+0x73/0xb0 [ 1343.346183] ? do_fast_syscall_32+0x34d/0xfb2 [ 1343.350723] ? entry_SYSENTER_compat+0x70/0x7f [ 1343.355361] ? find_held_lock+0x36/0x1c0 [ 1343.359476] ? perf_trace_sched_process_exec+0x860/0x860 [ 1343.365023] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1343.370634] __should_failslab+0x124/0x180 [ 1343.374928] should_failslab+0x9/0x14 [ 1343.378807] kmem_cache_alloc_trace+0x2d7/0x750 [ 1343.378825] ? kmem_cache_alloc+0x33a/0x730 [ 1343.378858] ? __might_sleep+0x95/0x190 [ 1343.387993] ? sock_destroy_inode+0x60/0x60 [ 1343.388013] sock_alloc_inode+0x66/0x260 [ 1343.388027] ? sock_destroy_inode+0x60/0x60 [ 1343.388045] alloc_inode+0x63/0x190 [ 1343.388059] new_inode_pseudo+0x71/0x1a0 [ 1343.388072] ? prune_icache_sb+0x1c0/0x1c0 [ 1343.388094] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1343.388115] sock_alloc+0x41/0x270 [ 1343.388132] __sock_create+0x175/0x930 [ 1343.388150] ? kernel_sock_ip_overhead+0x570/0x570 [ 1343.388173] ? __sb_end_write+0xd9/0x110 [ 1343.388198] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1343.388213] __sys_socket+0x106/0x260 [ 1343.388229] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1343.388249] ? move_addr_to_kernel+0x70/0x70 [ 1343.396628] ? entry_SYSENTER_compat+0x70/0x7f [ 1343.396652] ? trace_hardirqs_off_caller+0x310/0x310 [ 1343.396677] __ia32_sys_socket+0x73/0xb0 [ 1343.396699] do_fast_syscall_32+0x34d/0xfb2 [ 1343.396720] ? do_int80_syscall_32+0x890/0x890 [ 1343.447951] ? entry_SYSENTER_compat+0x68/0x7f [ 1343.447971] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1343.447990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1343.448009] ? trace_hardirqs_on_caller+0x310/0x310 [ 1343.466776] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1343.466798] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1343.466814] ? __switch_to_asm+0x40/0x70 [ 1343.466825] ? __switch_to_asm+0x34/0x70 [ 1343.466857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1343.466881] entry_SYSENTER_compat+0x70/0x7f [ 1343.466895] RIP: 0023:0xf7efea29 [ 1343.466917] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1343.475366] RSP: 002b:00000000f5efa0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000167 [ 1343.475386] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 1343.475394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1343.475401] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1343.475407] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1343.475414] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1343.597370] socket: no more sockets [ 1343.609811] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf8f70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x5421, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1343.805554] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1276, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:01 executing program 0 (fault-call:5 fault-nth:2): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1344.151458] FAULT_INJECTION: forcing a failure. [ 1344.151458] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.187890] CPU: 0 PID: 16185 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #264 [ 1344.195345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.204827] Call Trace: [ 1344.207469] dump_stack+0x244/0x39d [ 1344.211151] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1344.216419] ? print_usage_bug+0xc0/0xc0 [ 1344.216458] should_fail.cold.4+0xa/0x17 [ 1344.216493] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1344.224709] ? print_usage_bug+0xc0/0xc0 [ 1344.233909] ? find_held_lock+0x36/0x1c0 [ 1344.233934] ? find_held_lock+0x36/0x1c0 [ 1344.242159] ? rcu_softirq_qs+0x20/0x20 [ 1344.246178] ? perf_trace_sched_process_exec+0x860/0x860 [ 1344.251682] ? check_preemption_disabled+0x48/0x280 [ 1344.251707] __should_failslab+0x124/0x180 [ 1344.251727] should_failslab+0x9/0x14 [ 1344.251742] kmem_cache_alloc_trace+0x2d7/0x750 [ 1344.251771] __request_module+0x419/0xf0a [ 1344.251792] ? save_stack+0xa9/0xd0 [ 1344.261622] ? free_modprobe_argv+0xa0/0xa0 [ 1344.270128] ? __init_rwsem+0x1cc/0x2a0 [ 1344.270144] ? spin_dump.cold.3+0xe7/0xe7 [ 1344.270161] ? zap_class+0x640/0x640 [ 1344.270272] ? __put_user_ns+0x60/0x60 [ 1344.270298] ? find_held_lock+0x36/0x1c0 [ 1344.278126] ? new_inode_pseudo+0xc1/0x1a0 [ 1344.286479] ? lock_downgrade+0x900/0x900 [ 1344.294378] ? kasan_check_read+0x11/0x20 [ 1344.302364] ? do_raw_spin_unlock+0xa7/0x330 [ 1344.310779] ? do_raw_spin_trylock+0x270/0x270 [ 1344.310807] ? _raw_spin_unlock+0x2c/0x50 [ 1344.310825] ? __sanitizer_cov_trace_pc+0x40/0x50 [ 1344.310853] ? check_preemption_disabled+0x48/0x280 [ 1344.310880] ? get_next_ino+0x10b/0x180 [ 1344.319473] __sock_create+0x6e1/0x930 [ 1344.319495] ? kernel_sock_ip_overhead+0x570/0x570 [ 1344.319518] ? __sb_end_write+0xd9/0x110 [ 1344.319540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1344.319560] __sys_socket+0x106/0x260 [ 1344.328331] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1344.328351] ? move_addr_to_kernel+0x70/0x70 [ 1344.328366] ? entry_SYSENTER_compat+0x70/0x7f [ 1344.328384] ? trace_hardirqs_off_caller+0x310/0x310 [ 1344.328406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1344.338306] __ia32_sys_socket+0x73/0xb0 [ 1344.338328] do_fast_syscall_32+0x34d/0xfb2 [ 1344.338347] ? do_int80_syscall_32+0x890/0x890 [ 1344.338368] ? entry_SYSENTER_compat+0x68/0x7f [ 1344.351203] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1344.351221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1344.351234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1344.351249] ? trace_hardirqs_on_caller+0x310/0x310 [ 1344.351264] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1344.351280] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1344.351301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1344.360953] entry_SYSENTER_compat+0x70/0x7f [ 1344.369365] RIP: 0023:0xf7efea29 [ 1344.369384] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1344.369391] RSP: 002b:00000000f5efa0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000167 [ 1344.369404] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 1344.369412] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1344.369434] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1344.378451] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1344.378460] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1344.520565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1344.687632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:02 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c09, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9b100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:02 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1344.872867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:02 executing program 0 (fault-call:5 fault-nth:3): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c07, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1345.086983] FAULT_INJECTION: forcing a failure. [ 1345.086983] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.126777] CPU: 0 PID: 16216 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #264 [ 1345.134262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.143654] Call Trace: [ 1345.143686] dump_stack+0x244/0x39d [ 1345.143704] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1345.143723] ? is_bpf_text_address+0xd3/0x170 [ 1345.143747] should_fail.cold.4+0xa/0x17 [ 1345.143763] ? __save_stack_trace+0x8d/0xf0 [ 1345.143781] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1345.143813] ? save_stack+0xa9/0xd0 [ 1345.150083] ? kasan_kmalloc+0xc7/0xe0 [ 1345.150097] ? kmem_cache_alloc_trace+0x152/0x750 [ 1345.150121] ? __request_module+0x419/0xf0a [ 1345.150135] ? __sock_create+0x6e1/0x930 [ 1345.150147] ? __sys_socket+0x106/0x260 [ 1345.150159] ? __ia32_sys_socket+0x73/0xb0 [ 1345.150175] ? do_fast_syscall_32+0x34d/0xfb2 [ 1345.150190] ? entry_SYSENTER_compat+0x70/0x7f [ 1345.150209] ? find_held_lock+0x36/0x1c0 [ 1345.150245] ? check_preemption_disabled+0x48/0x280 [ 1345.159986] ? perf_trace_sched_process_exec+0x860/0x860 [ 1345.160009] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1345.160031] __should_failslab+0x124/0x180 [ 1345.160053] should_failslab+0x9/0x14 [ 1345.160067] __kmalloc_track_caller+0x2d1/0x760 [ 1345.160081] ? __request_module+0x419/0xf0a [ 1345.160096] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1345.160118] ? kmem_cache_alloc_trace+0x353/0x750 [ 1345.160138] ? __request_module+0x43b/0xf0a [ 1345.202768] kstrdup+0x39/0x70 [ 1345.202792] __request_module+0x43b/0xf0a [ 1345.202812] ? save_stack+0xa9/0xd0 [ 1345.202833] ? free_modprobe_argv+0xa0/0xa0 [ 1345.216024] ? __init_rwsem+0x1cc/0x2a0 [ 1345.216042] ? spin_dump.cold.3+0xe7/0xe7 [ 1345.216060] ? zap_class+0x640/0x640 [ 1345.216081] ? __put_user_ns+0x60/0x60 [ 1345.216112] ? find_held_lock+0x36/0x1c0 [ 1345.226649] ? new_inode_pseudo+0xc1/0x1a0 [ 1345.226668] ? lock_downgrade+0x900/0x900 [ 1345.226692] ? kasan_check_read+0x11/0x20 [ 1345.226705] ? do_raw_spin_unlock+0xa7/0x330 [ 1345.226718] ? do_raw_spin_trylock+0x270/0x270 [ 1345.226744] ? _raw_spin_unlock+0x2c/0x50 [ 1345.236569] ? __sanitizer_cov_trace_pc+0x40/0x50 [ 1345.236590] ? check_preemption_disabled+0x48/0x280 [ 1345.236613] ? get_next_ino+0x10b/0x180 [ 1345.236629] ? __sock_create+0x23f/0x930 [ 1345.236649] __sock_create+0x6e1/0x930 [ 1345.236670] ? kernel_sock_ip_overhead+0x570/0x570 [ 1345.245233] ? __sb_end_write+0xd9/0x110 [ 1345.245258] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1345.245278] __sys_socket+0x106/0x260 [ 1345.245298] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1345.245314] ? move_addr_to_kernel+0x70/0x70 [ 1345.245331] ? entry_SYSENTER_compat+0x70/0x7f [ 1345.245348] ? trace_hardirqs_off_caller+0x310/0x310 [ 1345.245370] __ia32_sys_socket+0x73/0xb0 [ 1345.254761] do_fast_syscall_32+0x34d/0xfb2 [ 1345.254780] ? do_int80_syscall_32+0x890/0x890 [ 1345.254798] ? entry_SYSENTER_compat+0x68/0x7f [ 1345.254815] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1345.254831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1345.254861] ? trace_hardirqs_on_caller+0x310/0x310 [ 1345.264804] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1345.264823] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1345.264837] ? __switch_to_asm+0x40/0x70 [ 1345.264860] ? __switch_to_asm+0x34/0x70 [ 1345.264880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1345.264903] entry_SYSENTER_compat+0x70/0x7f [ 1345.272316] RIP: 0023:0xf7efea29 [ 1345.272341] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1345.272347] RSP: 002b:00000000f5efa0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000167 [ 1345.272359] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 1345.272368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1345.272376] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1345.272384] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1345.272392] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:14:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xef80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x80041272, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:03 executing program 0 (fault-call:5 fault-nth:4): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c01, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1345.908887] FAULT_INJECTION: forcing a failure. [ 1345.908887] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.951129] CPU: 0 PID: 16232 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #264 [ 1345.958584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.967961] Call Trace: [ 1345.970596] dump_stack+0x244/0x39d [ 1345.974271] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1345.979502] ? rcu_softirq_qs+0x20/0x20 [ 1345.983526] should_fail.cold.4+0xa/0x17 [ 1345.987627] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1345.992774] ? __kernel_text_address+0xd/0x40 [ 1345.997318] ? unwind_get_return_address+0x61/0xa0 [ 1346.002309] ? find_held_lock+0x36/0x1c0 [ 1346.006434] ? perf_trace_sched_process_exec+0x860/0x860 [ 1346.011935] __should_failslab+0x124/0x180 [ 1346.016215] should_failslab+0x9/0x14 [ 1346.020054] kmem_cache_alloc_trace+0x2d7/0x750 [ 1346.024865] ? rcu_pm_notify+0xc0/0xc0 [ 1346.028812] call_usermodehelper_setup+0x113/0x440 [ 1346.033792] ? dec_ucount+0x340/0x340 [ 1346.037636] ? call_usermodehelper_exec_work+0x2f0/0x2f0 [ 1346.043131] ? kmem_cache_alloc_trace+0x353/0x750 [ 1346.048014] ? memcpy+0x45/0x50 [ 1346.051347] __request_module+0x52d/0xf0a [ 1346.055543] ? save_stack+0xa9/0xd0 [ 1346.059216] ? free_modprobe_argv+0xa0/0xa0 [ 1346.063580] ? __init_rwsem+0x1cc/0x2a0 [ 1346.067596] ? spin_dump.cold.3+0xe7/0xe7 [ 1346.071790] ? zap_class+0x640/0x640 [ 1346.075576] ? __put_user_ns+0x60/0x60 [ 1346.079541] ? find_held_lock+0x36/0x1c0 [ 1346.083655] ? new_inode_pseudo+0xc1/0x1a0 [ 1346.087934] ? lock_downgrade+0x900/0x900 [ 1346.092142] ? kasan_check_read+0x11/0x20 [ 1346.096348] ? do_raw_spin_unlock+0xa7/0x330 [ 1346.100800] ? do_raw_spin_trylock+0x270/0x270 [ 1346.105469] ? _raw_spin_unlock+0x2c/0x50 [ 1346.109664] ? __sanitizer_cov_trace_pc+0x40/0x50 [ 1346.114556] ? check_preemption_disabled+0x48/0x280 [ 1346.119623] ? get_next_ino+0x10b/0x180 [ 1346.125158] __sock_create+0x6e1/0x930 [ 1346.129139] ? kernel_sock_ip_overhead+0x570/0x570 [ 1346.134168] ? __sb_end_write+0xd9/0x110 [ 1346.138277] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1346.143872] __sys_socket+0x106/0x260 [ 1346.147715] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1346.152366] ? move_addr_to_kernel+0x70/0x70 [ 1346.156854] ? entry_SYSENTER_compat+0x70/0x7f [ 1346.161484] ? trace_hardirqs_off_caller+0x310/0x310 [ 1346.166643] __ia32_sys_socket+0x73/0xb0 [ 1346.170754] do_fast_syscall_32+0x34d/0xfb2 [ 1346.175139] ? do_int80_syscall_32+0x890/0x890 [ 1346.179763] ? entry_SYSENTER_compat+0x68/0x7f [ 1346.184409] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1346.189487] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1346.194372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1346.199259] ? trace_hardirqs_on_caller+0x310/0x310 [ 1346.204320] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1346.209381] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1346.214447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1346.219334] entry_SYSENTER_compat+0x70/0x7f [ 1346.223778] RIP: 0023:0xf7efea29 [ 1346.227185] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 20:14:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1346.246123] RSP: 002b:00000000f5efa0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000167 [ 1346.253881] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 1346.261185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1346.268483] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1346.275781] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1346.283086] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:14:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1346.507758] __nla_parse: 2 callbacks suppressed [ 1346.507773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:04 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41ebc}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1200]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x5460, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1346.812569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:04 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:04 executing program 0 (fault-call:5 fault-nth:5): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1347.034308] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1347.096687] FAULT_INJECTION: forcing a failure. [ 1347.096687] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.136347] CPU: 0 PID: 16270 Comm: syz-executor0 Not tainted 4.20.0-rc5+ #264 [ 1347.143795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.153182] Call Trace: [ 1347.155870] dump_stack+0x244/0x39d [ 1347.159599] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1347.164854] ? zap_class+0x640/0x640 [ 1347.168635] should_fail.cold.4+0xa/0x17 [ 1347.172764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1347.177935] ? find_held_lock+0x36/0x1c0 [ 1347.182066] ? is_bpf_text_address+0xac/0x170 [ 1347.186627] ? lock_downgrade+0x900/0x900 [ 1347.190825] ? check_preemption_disabled+0x48/0x280 [ 1347.195935] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 1347.200926] ? kasan_check_read+0x11/0x20 [ 1347.205127] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1347.210470] ? rcu_softirq_qs+0x20/0x20 [ 1347.214521] ? rcu_softirq_qs+0x20/0x20 [ 1347.218550] ? unwind_dump+0x190/0x190 [ 1347.222531] ? is_bpf_text_address+0xd3/0x170 [ 1347.227089] ? kernel_text_address+0x79/0xf0 [ 1347.231584] ? __kernel_text_address+0xd/0x40 [ 1347.236147] ? unwind_get_return_address+0x61/0xa0 [ 1347.241162] ? __save_stack_trace+0x8d/0xf0 [ 1347.245563] __should_failslab+0x124/0x180 [ 1347.249878] should_failslab+0x9/0x14 [ 1347.253740] kmem_cache_alloc+0x47/0x730 [ 1347.258434] ? save_stack+0xa9/0xd0 [ 1347.262129] ? save_stack+0x43/0xd0 [ 1347.265809] ? kasan_kmalloc+0xc7/0xe0 [ 1347.269763] __debug_object_init+0xbb8/0x1290 [ 1347.274359] ? entry_SYSENTER_compat+0x70/0x7f [ 1347.279011] ? debug_object_free+0x690/0x690 [ 1347.283463] ? find_held_lock+0x36/0x1c0 [ 1347.287614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1347.293198] ? check_preemption_disabled+0x48/0x280 [ 1347.298288] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1347.303895] ? rcu_pm_notify+0xc0/0xc0 [ 1347.307873] ? call_usermodehelper_setup+0x113/0x440 [ 1347.313029] ? rcu_read_lock_sched_held+0x14f/0x180 [ 1347.318101] ? kmem_cache_alloc_trace+0x353/0x750 [ 1347.323033] debug_object_init+0x16/0x20 [ 1347.327145] __init_work+0x50/0x60 [ 1347.330755] call_usermodehelper_setup+0x12e/0x440 [ 1347.330773] ? dec_ucount+0x340/0x340 [ 1347.330795] ? call_usermodehelper_exec_work+0x2f0/0x2f0 [ 1347.330813] ? kmem_cache_alloc_trace+0x353/0x750 [ 1347.330831] ? memcpy+0x45/0x50 [ 1347.330862] __request_module+0x52d/0xf0a [ 1347.330883] ? save_stack+0xa9/0xd0 [ 1347.339826] ? free_modprobe_argv+0xa0/0xa0 [ 1347.339860] ? __init_rwsem+0x1cc/0x2a0 [ 1347.339876] ? spin_dump.cold.3+0xe7/0xe7 [ 1347.339894] ? zap_class+0x640/0x640 [ 1347.339915] ? __put_user_ns+0x60/0x60 [ 1347.339944] ? find_held_lock+0x36/0x1c0 [ 1347.339973] ? new_inode_pseudo+0xc1/0x1a0 [ 1347.339989] ? lock_downgrade+0x900/0x900 [ 1347.340022] ? kasan_check_read+0x11/0x20 [ 1347.350560] ? do_raw_spin_unlock+0xa7/0x330 [ 1347.350578] ? do_raw_spin_trylock+0x270/0x270 [ 1347.350606] ? _raw_spin_unlock+0x2c/0x50 [ 1347.350623] ? __sanitizer_cov_trace_pc+0x40/0x50 [ 1347.350643] ? check_preemption_disabled+0x48/0x280 [ 1347.350671] ? get_next_ino+0x10b/0x180 [ 1347.350697] __sock_create+0x6e1/0x930 [ 1347.350719] ? kernel_sock_ip_overhead+0x570/0x570 [ 1347.350742] ? __sb_end_write+0xd9/0x110 [ 1347.350761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1347.350778] __sys_socket+0x106/0x260 [ 1347.350810] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1347.403046] ? move_addr_to_kernel+0x70/0x70 [ 1347.403064] ? entry_SYSENTER_compat+0x70/0x7f [ 1347.403082] ? trace_hardirqs_off_caller+0x310/0x310 [ 1347.403112] __ia32_sys_socket+0x73/0xb0 [ 1347.403135] do_fast_syscall_32+0x34d/0xfb2 [ 1347.403154] ? do_int80_syscall_32+0x890/0x890 [ 1347.403174] ? entry_SYSENTER_compat+0x68/0x7f [ 1347.421824] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1347.421852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1347.421868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1347.421883] ? trace_hardirqs_on_caller+0x310/0x310 [ 1347.421899] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1347.421914] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1347.421935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1347.421960] entry_SYSENTER_compat+0x70/0x7f [ 1347.421973] RIP: 0023:0xf7efea29 [ 1347.422000] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1347.429937] RSP: 002b:00000000f5efa0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000167 [ 1347.429952] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000000000 [ 1347.429960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1347.429967] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1347.429975] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1347.429984] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1347.606565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x6c000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8e100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1265, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:05 executing program 0 (fault-call:5 fault-nth:6): syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1347.768268] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1261, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x541b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:05 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x700000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1279, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1348.105246] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x402c5828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4020940d, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:06 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xffffffff88200000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11093]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1348.417019] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1348.698758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1348.908918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1349.066733] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x820e0000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1268, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:06 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110a9]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1263, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:07 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x92400, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000540)=0xfe4e) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000000000)) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:07 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x8a1e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x40041271, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1267, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:07 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661ea, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1277, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x8f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c00, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd510010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:08 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xd8, r2, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x28}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x39}}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffffffffff0001}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x19409cc7}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0xd8}}, 0x4000000) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x40049409, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1262, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc41e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x125e, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1278, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:08 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x2, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1351.528065] __nla_parse: 9 callbacks suppressed [ 1351.528081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1351.772299] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1351.934862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1352.096767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:09 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x9effffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0401273, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:09 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) accept4(r1, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000000)=0x80, 0x800) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x125f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1352.438909] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:10 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x371e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1264, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1260, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1269, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1352.744416] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:10 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xfffffff0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x402c582a, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1353.104175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1353.256380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:11 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xbf8030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4a000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:11 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000540)=0x2) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x0) [ 1353.403950] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x5450, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:11 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1353.819013] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:11 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:11 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000000c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) 20:14:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c05, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:11 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1a030000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c03, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:12 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x2000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x80041270, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110d5]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:12 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c06, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:12 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41ebd}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x301, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x127c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1274, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:13 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661f0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:14 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb4100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:14 executing program 0: r0 = gettid() r1 = syz_open_procfs(r0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0485510, &(0x7f00000000c0)={0x6, 0x4, 0x7f, 0x7f, &(0x7f0000000280)=[{}, {}, {}, {}]}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000140)=r1) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) openat$cgroup_procs(r1, &(0x7f0000000600)='cgroup.procs\x00', 0x2, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000580)={0xaa}, 0x4) 20:14:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1356.670893] __nla_parse: 11 callbacks suppressed [ 1356.670907] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:14 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc61e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf6100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1356.976095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:14 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661ee, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1357.305325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1357.490081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1357.650775] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff7f00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x12000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:15 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x0, 0x0, 0x0) mmap(&(0x7f000033b000/0x4000)=nil, 0x4000, 0x2, 0x110, r2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x74, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e21, 0x5, @mcast2, 0x10f}, @in6={0xa, 0x4e24, 0x800, @mcast1, 0x5}, @in6={0xa, 0x4e20, 0x100000000, @empty, 0x2}]}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000880)={r5, 0xea, "42c683917e63160c7b01995a6d348ff6166f722d93dfbf02c2a45b002c08cb077e25ec2173052a58002df8679aa196bea6b133441386f0b66e2d29ac8382188440883e2e01314c8e0a6efcdda017dc2690646f6618eec41f5a8eb63d2302a32c7c26d9b179546982811f4cf85be9bef9ed23e94f101f241cabcf5cbdd2c1ed614c0853aa0bacc07e1d4bf9fbf7b651ba0924915538526d6d5eb42aab28bb6ebda919df2a99f8a5340165f73c2fd786e6fd2667912683a0f795426b0269b794e8d55ae0f198eb5c829daf065b09780a0a31f9305c2b1e7d6ead3aed7c6de7daaca1dfcd48b5ee6d0524d2"}, &(0x7f0000000600)=0xe5) 20:14:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7a00]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1357.807630] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0xfdfdffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:15 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) chdir(&(0x7f0000000100)='./file1\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@rand_addr, @multicast2, @empty}, &(0x7f00000000c0)=0xc) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1358.138081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:15 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x60}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:15 executing program 0: r0 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0xc, 0x50201) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000100)=0x300000000000) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, 0x0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x3f) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:16 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf461060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0xfffffdfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1358.499822] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1358.754047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1358.915344] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:16 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:16 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:17 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xc31e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:17 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xffffffe4, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f00000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4a00000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x8) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0xfffffdfd, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xe4ffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0xfdfdffff, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x12000000, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:18 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x6c, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1361.753497] __nla_parse: 11 callbacks suppressed [ 1361.753508] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1361.912862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:19 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) creat(&(0x7f00000000c0)='./file2\x00', 0x8) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000280)=""/227, 0xfffffffffffffdbc) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:19 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfef7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc2100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1362.055314] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:19 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'ip6_vti0\x00'}) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:20 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f00000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:20 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000280)=0x80, 0x80000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x54e, 0x8000) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x11, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) fcntl$addseals(r1, 0x409, 0x4) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000000)) 20:14:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1362.387177] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0xfdfdffff, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1362.698208] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:20 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x10, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x12000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:20 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe8100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1363.008158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1363.218807] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:21 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x4f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa710010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:21 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000000)={0xe0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40086436, &(0x7f00000000c0)={r2, 0x401}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1363.434786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1363.732333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1363.909071] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:21 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xbd1e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0xfffffdfd, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88200000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x1200, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:22 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x60000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:22 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e23, 0x7fffffff, @local, 0xfd31}}, 0x0, 0x3, 0x8000, 0x4, 0x3400000000000000}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x40}, &(0x7f0000000340)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000d5c000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000600)='TRUE', 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0xf12) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x0, 0x3, 0x5, 0x8, 'syz1\x00', 0xfffffffffffff83d}) fcntl$getownex(r2, 0x10, &(0x7f0000000640)={0x0, 0x0}) prlimit64(r4, 0xf, &(0x7f0000000680)={0x7, 0x7}, &(0x7f00000007c0)) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x160001, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r5, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:22 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file1\x00', 0x0) 20:14:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:22 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x200000000000000, 0x4001) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf5f70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xee100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:23 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xbc1e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:23 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x40000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xea10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:23 executing program 0: r0 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'eql\x00', 0x803}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f00000000c0)={"65716c000000a95b00", @ifru_mtu=0x1}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x0) mount(&(0x7f0000000000)=@sr0='/dev/sr0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000280)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0xfffffffffffffeb7) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:24 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3f7f7}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1200, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1366.805866] __nla_parse: 11 callbacks suppressed [ 1366.805879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:24 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x331e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:24 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x800) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xba10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1367.092787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:24 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x2000, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file1\x00', 0x0, 0x18}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0106434, &(0x7f0000000280)={0x2d78, 0x0, 0x1, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0086438, &(0x7f00000002c0)={0x2, r3}) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000880)=""/4096, &(0x7f0000000100)=0x1000) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x100) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:24 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xfd610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1367.281761] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfffffdfd, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa110010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1367.553017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1367.792791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:25 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfffffff0}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1368.052702] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:25 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x820e0000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:25 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ptrace$peekuser(0x3, r2, 0x6) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40046607, &(0x7f0000000000)=0x1f) 20:14:25 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1107f]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1368.283357] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xfdfdffff, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1368.593311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:26 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x2620600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:26 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="66696c7465720000000000000000eeffffffffffffff0000000000000000000002000000000000000000400000000016000000000000000000000000000000000000000000000000"], 0x48) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x12000000, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c00000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1368.821480] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:26 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f00000002c0)={0x8, "35acd3fd431d780d03b9467c8631321fe4f491d4eac367b09eb80ed183014c51", 0x1, 0x1}) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r5, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)={r4, r3}) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r6, 0x2d, "cafca216a8c6a4af8588d3ce9a8c418aba8f53da0b0b6432436a20de9cec64eb42d36a6ab32b80163a63be972c"}, &(0x7f0000000140)=0x35) [ 1369.171975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:27 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x820e000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:27 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x2f1e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:27 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x40, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc2c45512, &(0x7f0000000880)={{0x6, 0x5, 0x2, 0x7fffffff, 'syz1\x00', 0x5e7}, 0x0, [0xb3, 0x7, 0x0, 0x7fffffff, 0xffff, 0x33f5, 0x80000000, 0x7, 0x401, 0x401, 0x7, 0x1, 0x8, 0x1, 0x4, 0x1000, 0x8, 0xffff, 0xb4c, 0xffffffff, 0x10000, 0x8000, 0x899, 0xf86, 0x3, 0x8, 0x9, 0x2, 0xffffffffffffff1f, 0x1, 0xd098, 0x1ff, 0x0, 0x7ff, 0x3f, 0x2, 0x4a, 0x5, 0x9, 0x8, 0x9, 0x9, 0x2a17, 0x1, 0x5, 0x9, 0xb777, 0x6, 0x400, 0x3, 0x4, 0xac, 0x10001, 0x1, 0x6, 0xfffffffffffffb47, 0x93, 0x5, 0x7, 0x4, 0x80000000, 0x7fffffff, 0x4, 0x2, 0x7, 0x6, 0x27fe, 0x400, 0x80000001, 0xfc00000000000000, 0x1f, 0x9, 0x4, 0x9, 0x4, 0x0, 0x6, 0x200, 0x2, 0x5f7b, 0x3, 0x2, 0x7ff, 0x95, 0x8, 0x9, 0x6, 0x5, 0x7fff, 0x4, 0xdf, 0x7, 0x80, 0x4, 0x1f, 0x100000001, 0x7f, 0x8, 0x6, 0x57, 0x80000000000000, 0x7, 0x9, 0xffffffffffffff01, 0x5, 0x9, 0x20, 0x93, 0x6, 0x1ff, 0x1, 0x7fff, 0x80000000, 0xffff, 0x4, 0x213, 0x3f, 0x5, 0x6, 0x8, 0x49, 0x9, 0x8, 0x100, 0x5, 0x9, 0x36d, 0x45], {0x77359400}}) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa0100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1200, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:27 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:28 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x48000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:28 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getxattr(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)=@known='trusted.overlay.upper\x00', &(0x7f00000002c0)=""/48, 0x30) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r1, &(0x7f00000000c0), &(0x7f0000000000)=0x6e) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000600)={0x0, @multicast1}, &(0x7f0000000640)=0xc) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x3, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) r2 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000580)="e843842a878a9cfc1a8bbd527102cac3e2739a9fec3d875c7a2f7b7ee20fc518198daa8a", 0x24, 0x0) r3 = add_key(&(0x7f0000000680)='asymmetric\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x8, r2, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:28 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9e100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:28 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xffffffff88200000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:28 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) finit_module(r0, &(0x7f0000000800)='\'\x00', 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) recvmsg(r2, &(0x7f00000007c0)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/205, 0xcd}, {&(0x7f0000000000)=""/23, 0x17}, {&(0x7f0000000880)=""/203, 0xcb}, {&(0x7f0000000140)=""/54, 0x36}, {&(0x7f0000000980)=""/234, 0xea}, {&(0x7f0000000580)=""/61, 0x3d}, {&(0x7f0000000600)=""/69, 0x45}], 0x7, &(0x7f0000000a80)=""/140, 0x8c, 0x8001}, 0x40) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:29 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x7}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:29 executing program 0: socketpair$inet6(0xa, 0x8000f, 0x100, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @multicast2}}, [0x4, 0x0, 0x1000, 0xc18, 0xc000, 0x200, 0x81, 0x4, 0x57, 0x1, 0x101, 0x6, 0x669, 0x1, 0xffffffffffffffff]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000580)={r1, 0xa0, &(0x7f0000000600)=[@in6={0xa, 0x4e24, 0x0, @mcast1, 0xffffffffffffff81}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e22, 0x4, @local, 0x9}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e21, 0xa35, @loopback, 0x1}, @in6={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x1ff}, 0x3ff}]}, &(0x7f00000007c0)=0xc) syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) readlink(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000880)=""/113, 0x71) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x400000000, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:29 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:29 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(r0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000000)={0x2c, 0x3, 0x0, {0x1, 0xb, 0x0, '/dev/loop#\x00'}}, 0x2c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfdfdffff, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1371.853370] __nla_parse: 10 callbacks suppressed [ 1371.853379] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:29 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x803, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000140)=0x2a, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000880)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2400010}, 0xc, &(0x7f0000000640)={&(0x7f0000000900)=ANY=[@ANYBLOB="9c000000f0eecdb8a6653f827cfd4e5fd3e4a52efbdc198d9ebf29845cbfc346123b327c18267ea17d59dc821d846b306f98253a4fa064a5e84a08afa7b80e2f3c045fc9ba1dacdb0000000000003eb72cad5eb4c3f4135e05748e4c879b1905b633ee052185087f58988d3dd8e8eb730613a5654c955cf5562ea3ff8ed2b123f44ca8151aead331e362f4", @ANYRES16=r5, @ANYBLOB="000025bd7000ffdbdf25070000003400020008000b000a000000080002004e20000008000300020000000800060000000000080007000200000008000700070000004c00020008000700060000000800040008000000080008007f0000000800060008000000080003000300000008000800060000000800050006000000080006000180000008000500000000000800040017000000"], 0x9c}, 0x1, 0x0, 0x0, 0x404c050}, 0x4c005) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000680)='./file1\x00', 0x2) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e21, 0xffffffffffffffff, @dev={0xfe, 0x80, [], 0x17}, 0x4}}, [0xaf2, 0x1000, 0x7, 0x6, 0x8, 0x8, 0xffffffffffffffff, 0x60000000000, 0x5, 0xfffffffffffffe00, 0x7, 0x3, 0xd, 0x20000000, 0xb8]}, &(0x7f0000000100)=0x100) [ 1372.275498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:30 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x6c}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfffffdfd, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1372.434983] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1372.652684] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:30 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xf000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf110010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00007d6000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x50, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00') prlimit64(r4, 0x7, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000000)={0x4, 0x1, 0x4, 0x1}, 0xc) 20:14:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1372.813257] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1200000000000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1373.118065] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:31 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x700, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:31 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000000c0)='lo\x00') 20:14:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1373.331326] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:31 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40200) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1373.718832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:31 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xfdf7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1373.885984] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1374.092028] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:31 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xd90c000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2e0]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:31 executing program 0: clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0xb1, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) write$9p(r1, &(0x7f0000000880)="8aad7e3f32d49daedf0a9003b513cc47633d71185d00fb59e4cc5ac9b35d8fa01028e85233a3fbcc5a62e5ad42407ecd9784f440b862faa63118aa46c29717d5c255152e0f2eefd496d1a00642cfe73220ae379cf692f05947cae95b9d8527782cca17a4f63c81b0ee5d2baf003f29d87ef933e4e69b0c56b530e5c261c262a9d2ed4ef8de3644792b5b7f3a24c0ea6a16af949b30ddde1463207086ae7c98bea319e97f45b73c878a160763b21adce2de206fcec0164600517e1e08cc3a303cb2459d78476d5e41bd112e3a3102d8a1e5990d9c5dbe1c78f1de16d3327608651e468ab02e1ae9cdf34b63fb0025e048067d6cd6337cc8f06262c6d4c466fbeb50403db2bf2849689bac24c95e9dcaf297e96242344632a2236d57179ecf18827b5242929e668054f2720a33b29ed196b353d5aff37dee0c614847da241c4921193de941d6145850d4d417391874ba0c216b6a2f18e25fd3368a30c01d58ded2895e76fedbb57b6406a122d96bf6c1012afb6374a457d3af37325b781713ff11ab00f766050412a874eba61083acb3822d76bdec2ef8bed32529c69353e317bb02bd4a38aeb1cbebccf785dfe4a52f85ef26b41831c5d831a86dab984adc44aa7ae227c40a2a0948d9788728497c9abe87fe9487db35ef6b6abfd6213d1ed2e372175ad1fbcd702cc93dec8eacf67b1c76062ef7853a97592ae08c162815945418f11ffb6d68ef7146b44a41bb9d5c186dd79add585b7f1b1558e0d8432c9fbed0386906d10e78e7349ae00ad9f2b22c91135adedaeefff035d0edc4e48b0c29c839e6eed2fb9548238e54a0a7d3682b9511e0ae5b61ae17490654764dde5d45b9a0ab9d04b5913edec78de5d3eaa0410ffa77d3ffd70f6030606bd537fb96d22a124e9717a0232d111cdf9eb996e09795a041afc9ffaa43c01f3269a79a8176d843a4cc1b1ecc54a4c62f08623a153769395940cb9e0a13b5b55322650c1e5c5007cbab54b275c68ed31dacd773b4c3a3adc60d5f1681bf79bf3ae9ebac266cabd6f773bd1faf1bc7e9fafbe22888e99207b38aaedae1d44d39c39a0b44b41e36608674aec1c1227031443f3004f7737487bfe012b36940f064bd167bebda0f5d0a50e24bb79d3d2c449312da1bce8458ded4c7c5ee866ac64a6d1381e258d1721bc388f9c3bbf33c99ccedeac4d412a7350f1a6b9bebf7aaea621806a2beb86bd3c49fd7a5c949c46ed0b21418d1f42e1be2dfe33758b5ac36df2cb4ec6d1b94518d1539802b02d23a941d7409914a25ffc2411505ac857559f703ba02b7f9d47fe217c3224f7f17d8584add62a6a3e14273bdaf7af203dfd4864d61410c9f96e03835f6460210b4d88fbe18260d4857b47b70032762acf8ea4c35bfd78560c39a14cb1272bef6ab20cfbe959e2e54e369c2266c7cf2d4448d7c4ddef9e38ba6dc40613c7ac5adccd219a8403bcaa444eb78b73987f36a901cca8e1c75ae71559c4bc90a1cfc42b9778d069316a9610ef2922b173a2207fc0365d130adff419cb2afd094361b50a7b3d91a09fdfeced8a11348c2901de6d3c9aff4037e19ec04c7307d825a0c32acf42b1db663ba2c9006b11dfb57c0dfa1a44613dfb3d7a22d9822b4ed5b1e8d4f8d41b81e6719fe2eee306703397061d3bfff78a9803359840cee943caa4dcf13c9f99ed7222d4d0bb42e3e78713999856b4fa6293ba860448de0777341b9d1ca6db95a3801831c9a0db4370c05a633711fadc7b9aff9385aa54b9210275473c9d88805cba06e1a000549decbbdb57f15dd897758171507978836de4439d1969a7495df88f4314dc4ff1d0b00478d7b631ff57eb45e971bac1096cc6aaf4d813eaec8a202d038521f1caaabe08cdb7501f46179b2ba82553805654f4ac655eaf0f6ff48f9b99691484f3d5eab760a68896b4ee55fbe1b352f5e15c20a84b38e171708e0f9faf28e73c4a74231eb9bfc976a0ba70990721737e0e8fcd49894ed2335b7212fad382f80015fe7a374c5e5d8bda0c39b76398b1af1762a2bbf2dacfa9fade93d7d93da8e9426593028a2f7ba76e2004096da9920cf5405e342bbfe08561e63befa30d77b266cc3afccf66607a99a6e46a51d176e2722eeb73708786e063d21d04bfa1e381ce76098bcaccacdc0db43088399439ae21c0d001b3dcd576e2867daffbbf64a0b45e559373cb16b21c2f7209594c72dfd34135203584253f2dd0ea5c2a7efcf27809af4cc5c466b8ae388798730fcec33e8bd1d9e828695d1b2f618e10e66befb2bd2cc3d9b99776d44de42dc443c6e89b179d87023d63ba2138e202a636020a8164f49fdee43aae2a62455a86c472abf8eb25f2d2e547425709fbdb3f28009c90cff36f79f90f18806e8ce2eeed4e22fd2f41dbec46c98b1d8aac09945112c2e3a39bb48a50076aa94b068566a97a2bf11a8b33c5b4fece5939964fbc26ba0d1ed505ca4225da34f69fd16959c5d6f9edb5a1ecd5945f34862b8d55fa44c059f8f26282898db386d7fe6a203a57e2b26b1230be58cc094c65eb26535d0a5f8c920957f3ab4c339a61451a28260ff832a82b9271208071e257bfaf8a3b12ed4e2344019f937ca6101ba97bd9efa01941bb990c14840251ef48faf28e8a231013612b37ad31d98631f490b0e2de8a5eef5d9700b9dd4350e0d4cccd27429093c8c95b1c065ec87f53020c8edb8450f70b77580ff977e2cf17384a8f58dfa8b64d46a6e3f3aa33048d59e235940082a866f1956c68ce19086f0d100a164c037231f8d7d6a28274ed8e6973868dccf757042f044be6ed6bd187f8a8eab5ae4dd5c4a0242944e38f2b9f88d9d2ad612f94b88cdc1e8f19145925a7099ab4ec41c5fcf867fcee4b33103930bfd2f0febbf3d7cc9bae555d5937be656bc6435de3312517fe14caedd463676c79f4940cff1754dce04d83a38bd195709d24cd35adb26f0ed31851d780fb1b993c2a016bb1f56f7d0ec782172a5d09f228be2b7bd331e7b7b524d6d130de5fa379733c22b3c131e4412ceb7a075068c86230bc92432b034da32a7474e3f57d0046d61673b5706719fe7b518a7407ad33ec68b94a71536f151694d5bdeeab7d5fbfd30268ae6bf4d91880cc1c13901faccb60468a7c725b241e594612658fdcace13dce6a12ec0d59965ee8efe62f0eb75b762cb3cef1d86923a41adb181a0bea3df3618a20f9ceafd6170c3a3ad182a984b501c571cc3578804b8888183ce99423ec79923a64c31c3a33d93514ce3db3ecc97752018ed78b684028b564b3e0f97be13cecd81f324fa331ea7fdca2cca102b9a0bab6fc3629d2ba8fa97db0c83552068e931c97a014a0cffde636c58137169224462c1bee51df81411fdab124f86c48f8736e859d09f8738da2ea7d444ad9ccd0367240534b3c34d837ad91b1bdd29a66bc8a75c33ed0245b04f6d64d2cafc11129510393bb2b9e1ece30941346afc6486963b30f08212b28e80fcde468524e5d2578b1dd1010c5b2a5a25584b06dae4ed0d95bcfe234c83689734654997a18706f0ddbb56865acbdb15f49211b46270a8daada6920791d1c0daa2f42467996d30a306e407583c9b13f3eb82b74df18c5847de8cdcae4e919a1808739f99e4a388d147c6daae2dcb64e129327a14a6a866ea915bddbc75f2d9496ecac99d4319f7ac29ccf5678e82579ab7c2ba673a02ad05f6f89124851c3a3f2a367c1c006f2c069099008019f0b31067ff6411a1780d04a03e889f034ee9a47891690cebfa6dbb4939d8b2ec351521641e9ce4f6dd9df5dc71d4398cfe8541943125ee2afd0047ee984a65731fbdbf0026f8946b13cc32eb0709282adb5392b3a964bf4cb422b9b5b7ac42cf80c59c66f716deb8e6110f6ba961e4d0c4fc9f61b1df6e11a4081fbec99731cb94d2a8ee0469b6f808c35df64e5a3d3c73731b8fc7d0d73ff717bd119ff8fb55ecb0aa9178f02197bff7176354769065fe5d4cf5e64e6d525a33206d90cdc242afb7f216d341b376cb44b7921c5f409dbccac6d215a8327672e4560718ed17fe22a45be92d6ea8d45bbb074914c957d7512504b3e15b06b8575ac9c84e8095dc0e9ebd0dc379bbe49a93d352c25da4bead42fff3433d30a9169926f118f50ca28ea435e38829281fb9c8efae6d330cd19432e04e2f2ec77e01880db83e0e00e28695614d17864656132ecac1f0e3566551832918139862b6b0758ef1d025023c3bd8fea5032f294ed4ea0a128657337aaaaf6c71aba4b3acbc4d3615a05d2431543fd5bb7c8f09157c6cb07cf2b799767be3400dc1cf66c70b9ed4963200141e28567c5dc432cc3cc68e53ee02210aaee46dac89d8fd14076a178234355582eb905982a540ec29523f67c8dc6cb41a46ab47ec585f6ae33b7cbb2272e8a2ba0b78d1be59e4c90ba21f4d92fc9a207ee9befc464f0d95071604ffc2eb516c06f3ea4410876a2e4d92119e3855a5fdce277627a631ad5d5e5f6c6cda9a2d708b6f238e6b326e57e4d810012b81ced46aff7cd813ffac256c411766f2bba4d4c28e282fe9a2089768c92b077f054962941d1dc6c097ca3487b5831abe64c170fc471962ea297c253adbc4b416cc7970285126e051900e0f1a24bc8f3344eb38436890cb138b0d8f9a904ab12aa7ead9e923b795d307e06bb90616c45b48c6582ab9343be46705553a79943d89dba05a2bef72ba0925c2837e805e7f430b9a44f18b7380d4a49fb7b5fb197a822c95192547e830ba3384aefecd5a5f2692739d7faf185335f1c11663ebffdab271cd25df2d7e93618529bc0902badd5e31f496756b99698dbf402f2dc70d1b621661e1d204503639f7d5d880a7c5310bc92367407ede693d7a7361d329a423fef6fa6d0d4739e96181daa0cd56bd6609436fe6d28ca3d7c1416d55f9c7fd1eaf0685fbab14b32ce2cafd0e4fbf24f5cfcd86df3fa3bcdbd4831185192248566d80c1652fa98918552d67adcf5175eba52ec18512b7f65bc4d9b9372fd4edac3ea177f809d79b701a43b9d50d9c18576969b6ebbb70b918e2eb8e27c1cd34e0854b2c1dbe7c3c5e53f700680ceaef222f5a01a39767c8715f0c55ecd2526b6992c962cdbf9b3ae0f18048526371484f8f2289ba4b7986bdeb37c28dc47b3a0adc19490d13fb935960f6c028de6e8ad371e472e1440883fbf125b7f6f8cf910dcb6053ff445ad946f265bc553797de9050986be4cc625dd2dc7ae4ff2ac00e8e0d777d3eaeebc6cbc19de5569c50e4c696e699b4788618f842454ae543eda45063a363edcf9188ea27ced6756bfec6bf0a00738bef9559c4b34cf94ba1605e5c4a75cb5506b6ca630c81e16fe4858e23f09af14cd55238f54bc4844c86df52a06c73022b858e8f095b70fe2579463adf67e2753a863206851322da229e39a3975db3cc4a08d83679b0ac1f15dd44e8f34447bc2864d7de2687d01d3a43d19e05eea8ca29f4bd4719016e1c6f108fe29ead7e02a53650674e6bff0fe3e2ad2373f779fb73dd020e5ac5cca27c94da3f9553a37173c6473677c0664cfba272ac13af113e9dd1b7c28c21b4a93676574fd51866a5458bb8daaeea911c7250511260bde5b2912bb49318056029e2cd842035218114fdeec63efbbc83b448429b2b9638630c78e1f71a797e6c0154e8fdca02825839d95969fa15a967fe043c781928d56be246903fcc93bc89257af2679169266edd0bd3e52008dd7fe3b49889a98c19eb07ff930f3c9976256452a343465be4db5ad5b72866504bc8c5f8ec7665eae6ed", 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000000), &(0x7f00000000c0)=0x4) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:31 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:32 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = request_key(&(0x7f0000000900)='user\x00', &(0x7f0000000940)={'syz', 0x1}, &(0x7f0000000980)='@securitykeyring%\x00', 0xfffffffffffffff9) add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000007c0)={'syz', 0x0}, &(0x7f0000000800)="292d5a8cfb122b8497838439daa9944db22a91b6e6b10b6c806d60a1206ab5481505cc3e16c72e070c971b7fba7dff1a0c374bf14482c89d9de29fc0df556f2ff8e0053f784e0563e01eaeba48150843f114bf486cd951734f24fc091ae4360ee29a7e98d80c86ae7bc64f73d27a633c061709368256d45b361720f6a19a5235956c655a0b191b311488a27f2a80789f2685ebe115f4a5094a1602382123936056bbf51d267aa910db0bdbcda0080c833abb9c5ac44e3a1baa45e7c53b0c7ee3c006406f93c9a068536276f765e6", 0xce, r2) write$P9_RLINK(r0, &(0x7f0000000a40)={0x7, 0x47, 0x2}, 0xfffffffffffffeb6) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x10) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000500)) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x9, 0x8000, 0x81, &(0x7f0000000280)="9125d41d80fb058ddcad64b7e3961af14653f36349c8bbc5e17fc030ef02a58a6fc0ce59e69295db6eb0b5d6059928229976a07c89e1c0e29f7b3465e0c699cc2e33e480e498a0a183479ffd0bb2727e4fc8eeed5d078ffc4e6b8e28f881209ff27cab92b7cc6e9c7baa44518064f30b9f3562fa247a0b9563d5587e3433b0ec7b"}) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000340)='./file1\x00', 0x0, 0x80000000001a2004, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xfffffffffffffffb, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000640)={0x3fffffffc, 0x80000000}) mkdir(&(0x7f00000000c0)='./file1\x00', 0x40000) 20:14:32 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x7a00000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:32 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:32 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x1f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb910010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:33 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xbb1e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:33 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:33 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000000)=0xff1b) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:33 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xfb61060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110ac]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:33 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r0, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) iopl(0x7) 20:14:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:34 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf30a0000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:34 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4fb0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:34 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x1f000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:34 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = geteuid() stat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {0x1, 0x4}, [{0x2, 0x1, r1}], {0x4, 0x6}, [{0x8, 0x4, r2}], {0x10, 0x1}}, 0x34, 0x1) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0xe, &(0x7f0000000300)={0x101, 0x80000000}, &(0x7f0000000340)) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xcc10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1377.096849] __nla_parse: 11 callbacks suppressed [ 1377.096864] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1377.486594] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1377.658967] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:35 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3000000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:35 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x200601fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)=""/200, 0xc8) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x30, 0x0, 0x2}, 0xffff}}, 0x18) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) renameat2(r2, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x2) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8b10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1377.824344] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1378.125535] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:35 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x4800}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7027525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:35 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000100)={0x2c, 0x4, 0x0, {0x5, 0x6, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) 20:14:36 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x10000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1378.424379] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x12000000]}) 20:14:36 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0xa7, @mcast2, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)="4b453f96f08ab820e4663161aa7471f2bf70a7f3d0d32aa955fe87f51cf25bd84323be11bc1190f14cfcb490e33a169be645658bea5b5e6144217e8787c6bba2466efa3fd0412b519558803825589f6317920fa34155ebc760178192ef8e13507b714ca00c8a8c3a2f44a89d4939524edca84722200adc3072", 0x79}, {&(0x7f0000000600)="074048388a29a68599f09ffd60ed6e24b2acab4452769e63a0d2f307402f449cc017effb128e3e5cd7990e670048ac7bec7a589b04ebb466818a038d99469cb4c66fe07aa85735305ca4837df4ad61c03f8c641576e0d9caac0a55620ccbd21ee33f04ab74cc2602eabd404aac2e83b76502c00f87b97ffcd2b74151162ea1bfd9e2b10aca8aa1254b153cc5843bae95159498eaac", 0x95}, {&(0x7f0000000880)="7c5c357edb32416bd05a141fdf1a27fd4a1420fbcb0751498ad06cf7246e9f0708db3dd74d71a6b3e013f4a2847b9697311920c42a5a1017ce786f81b75ce6e5d26a39b06d035deb5f0115d7e9e7cf82772fb5cb28db8a6212bcf7686d8421d9f5433a2e2a71edc7089f38d2775b14c0c07c0e8e1c3061b6fd4710bfcde3666e0c91249a53b9cab48ad8be2c4762dc218e29f5c99e0688da464c017e7104632b7d6ae37d7a725c603642112e2d41d87b1da570ac468d569a74cef34f97b3dd2dcedde79772929425a3b8ab289d1fedfe650e664ca37edca2801fbfbb3b33674947aa92e89a9158ca7b17c2", 0xeb}], 0x3, &(0x7f0000000980)=[{0xb8, 0x0, 0x4, "8e3dd429a84f2c8f30ee6068168de69aa0bbdb3c1433282fefda53dca08c035b6f198e2fb0d7e659146283f2ec66c6c72cba9b4a37074314808d041174552bed250e655bcf250faa3aff6eb44a85fe8a1be129f1bac7f7f3d76f8b8a1e169e65075fd1f4d44891da9f56a1d90ac9afd0a6546d943a8b2b96ddea8535872bdf02d1011e3b1f18dce6ff1b1ede53af9ab7e87cb8ea562dc82336af38e2baf2d3f2f00d293cd6bf56051e"}, {0x74, 0x108, 0x8, "599c7df0bda470b50aa512c2220fa6998890eed67464f986fad5e3269e225ddbbc077e793e38761e6eda4784e1b647d24ffcfd9e3b838ed05916a67ce81b9cb96f1bd14a79903fe356119330470c4544d4b2c71641b6a87af79a5f8e35f070fd1d4ed100855decd4"}, {0xc0, 0x129, 0x8, "f40df3dcf92fb5e96c5e223eaf1e3aa37cfde943d2a2ce9f1ae97e2c2f7aaad1f18740e637cf5628a2f7eac607bf70265ac734f64f3b3338863394a0b079139deddde26f33a5096651580a356274f0d4ee708e24b3779da5121bf95b76c165b8a92b339fb8285d82f9d193e2e4f6c1bf9baf7418183ce308adc0b28560eb3aa1b214adf6a1e9e850bd4fbf51f2220125bd8ed87d4e2b4618306a81ab335fc20a02129799b4f038cf84b0ea1845d25b0849eb35"}, {0x100c, 0x116, 0x2, "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"}, {0x50, 0x139, 0x6, "69a14381f052aa337c5a2abca278ebffe2be917496f2bf9f32dd37b19a5e96154ffab8d614c98ad403b98b7052117fa7fd3fc407df3fcd2678b28083c79754d4449b5769"}, {0x5c, 0x0, 0xffffffffffffffff, "cad22a6870a02c5a54785e926fc1cfe70d47cee7f5c4ebfced76f32f790ccc29e59d83f62878543b225b16aaa726e19d44d69f84b7f663cf08a27c66ea1d0ffaef005033a62101f0be64ace9af"}, {0xb8, 0x117, 0x3, "68a8f2d85fc78061436e90ad4f013bb5f0a75361d1585320101694666ee35ed5e7a3ffc0d6f6bbc9f7ffc548eb55cd2bc28921e81be3f33163ec1e7c8a7ecd2c8e5f297293868a91fe07877e6601ecff9022bc7eda73bf80484d784b1e30a153ceb05a44aacfd527c46af500ecea63da6712a174f94e1fabfae07f27a958f464da16a71506e4c6539a96f574a0def7e0a5faabf75b42ef7c10c59f6cc6b51332279da726b32203895b42"}, {0x80, 0x119, 0x5ba1ffb5, "83e6c05f54f44c16e65e9c0aafbe190652f5086fa2423d79fbaeaab99936b3e5c1fa3c643ac4ec4cc4f3416acfe6f0a18235f45c4f36daac4169b93c206888a38691bf9f604209d4330a6217a356bce6679a46dda4a6e65b547d42823040ca401b06096e33c0738ec39a52d2d691c6c4937f"}], 0x13dc, 0x4000080}, 0x53a}], 0x1, 0x800) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:36 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x4000]}) 20:14:36 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000280)={0x23, 0x3, 0x0, {0x3, 0x2, 0x0, ']!'}}, 0x23) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000340)) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file1\x00', 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'ip_vti0\x00', 0x0}) bind$packet(r2, &(0x7f0000000300)={0x11, 0xff, r5, 0x1, 0xdc, 0x6, @broadcast}, 0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x401}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000100)={0x100, 0x4, 0x5, 0x1, 0x2, 0x8001, 0x0, 0xb2e, r6}, &(0x7f0000000140)=0x20) [ 1378.781325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1379.004382] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1379.150656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x2]}) 20:14:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe810010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:37 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xffffff7f, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:37 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xe, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1379.302292] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:37 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x700}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x1200000000000000]}) 20:14:37 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x803, 0x4002) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') mq_getsetattr(r2, &(0x7f0000000580)={0x2, 0x8001, 0x22, 0x81, 0xf3, 0x1ff, 0x6, 0x5}, &(0x7f0000000600)) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000328bd7000fddbdf25020000000c00080055b90000000000000c00040005000400000000000c00050004000000000000000c00060001000000000000000c00080003000000000000000c000300e8ffffffffffffff"], 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x4) write$cgroup_type(r0, &(0x7f0000000300)='threaded\x00', 0x9) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000340)={0x7f, 0x6ad684a8, 0x26c, 0xff, 0x7, 0x4}) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0xfdfdffff00000000]}) 20:14:37 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000580)=0x4) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file1/../file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x80000001, 0x4}, {0x9, 0x7fff}], r4}, 0x18, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r5, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000600)={0x14, 0x8, 0x3}, 0xc) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:37 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff9e}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd3100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:37 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x40000000]}) 20:14:37 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x100) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x9, 0x8001, 0x1}) syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000600)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) connect$packet(r2, &(0x7f0000000140)={0x11, 0xf7, r3, 0x1, 0x4, 0x6, @broadcast}, 0x14) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0xfdfdffff]}) 20:14:38 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) accept4(r0, &(0x7f00000029c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000002a40)=0x80, 0x80000) sendmmsg(r2, &(0x7f0000004400)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback}, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000000)="f971fbb4bb3b1cdf1d3818f4e93395df", 0x10}, {&(0x7f0000000280)="e2ac5de93495f25cb9b91d1118634721a4a022e03fc8533a1eb7ebd80a9ace4fbf83658b3bd7d1fd4353329a66857b0befc4df594b3e824124acff42a99716e2d3d50c69bacd90f3ec887ace44ac39447bf032247ce6c943767a62db39dd166e7cddd4aba874ddf75d619f59c6c03cb415c063fe15bcd5e8c47eae60136570c725a4eb0a6294e6b0115d9e984a95ac8b728f2364318cb36aba59a194d720cc79ad2372ff0ce1f8d245c81ca601c7d10fa5768998d66ec8", 0xb7}, {&(0x7f0000000600)="4eb4719cfde23ed2245fe35f8825ce27c29d6952d74b1c851b221e358b31da3873a37d3991f48e2d64e860c7fd9d73ac5c368baa79e1f43a4bf5d8e793ca21b86af75bb8bc57d3c51bdf3338ef", 0x4d}, {&(0x7f0000000140)}, {&(0x7f0000000880)="aac4ec4db2f84cbfd075b21baade4c030eeea322e84c220ba5b258a1ee3efe703c4c46f2fe5c2d91d2f8748174805c66f4f7bd9297ce612d4cfbfe2b5d02bdb507c9ded98af4525af5f667eae1df5d1c7db083221731abb92cd9a10312a8c874668f01d5419d91e491b9c573b9fc4ee51cde88d95f9e647b5436acd776bad77455bb4cdd4e0f7a8684b81b63de68375f21db0d479e1f0ffe3405f9f1c9dee9", 0x9f}, {&(0x7f0000000940)="e54976880db3ee204ee513473dad7c4ace901b39e205712d17e9ef1bdc8244e4cbb4ece7971bbb4f4712517f259293aecf4bb3060c47532d44f420d47ba9977b081204659d1847caa33ab54b775023eebef53e768752fccfb40edc9c42badcd8f403de3eb5472faf4e49860afa5b14b05705dff07796625b57d2a7569afe28cbf22409b85d26eb592c67d160586d57f3f60ce5965c5d5b7c4798c8149156d7efac79cdb3ad7f6664f0e75ff2e1c988bfab8b367328e74d52af2107f3f7c0649e552344f771730c67f859eeebb26342b54e853bccd869", 0xd6}, {&(0x7f0000000340)}], 0x7, &(0x7f0000000680), 0x0, 0x4048000}, 0x7b2}, {{&(0x7f00000007c0)=@sco={0x1f, {0xd, 0x10000, 0x1, 0x5, 0x6, 0x9}}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000a40)="52c21e22318290e67eb0856c0dfeea31608ff4194f9fdb59f29597502f42f20b0a6fa0f7492b016b60a4b1eacaba3f1e205e6f173898fabee89d96b4ac9b7511292b8403717e1019106c575c4d3e213394347fd64cf51ac857025d900edfb8be17c7273e2115d0547d760c24734d325fcddc20010ead21943690454bd4d48f1c592089f219252388ccd9c408eb02e739e73058db6f43f0269d0002c0704a122fc37194ade6e56ff8f16b74b7928c8d750c5d848232f85c006d5aff53f605af07c03e70660316266409e697ed5befb088a84de1685daa612a11729a02b957cb1fba641b1ae6369dfcc1b8", 0xea}, {&(0x7f0000000b40)="6b39691018153b12bf3f7e6186833bc929941c876d30247bc8d0697a8e1c1c187e5596c09360b006c23b565a37add3522adc720abf2d5894a3d6883168506fc484fd3fe8587f1b7dcde31dcf3f0de84aeb954c65bf7d7e156c9ef4afb17c7f3328725b5b9fb492b7609f5fff23b3", 0x6e}, {&(0x7f0000000bc0)="88f0c4af6e62dcbd2331b2471d3a1252c3837303aebe59dd651767cff532b606fb02ab80e32c4862db66895664c0f46c50982f5d85260a60efc7c282243b580ff1a62e26a6df2d6b12a534799d457a4c220732a2b04af41695bd4277756f13a63ce57aeb4dfc189554b4d215b19a511ed0a12ccaf6ce8def7053ccdb46ef5bb3e2a6958ee33ec6b927a9c3da872b59914777988818c89a4c9b8ee320ab3c5ef72ae4f5478c3d235f11ee9f68797bfb2dc8e93fcc65a198882fc8c2697acf805a34a41cfb5f381abd52", 0xc9}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)="b351a9c0c37717fa923931e10921b4de4fbb8b60d20f4863944588c1adebbacce251ec4bdf821975dde41a6803559446c913c51e7ac1e51447461d108490c192f3fbe87fb8c8be02b71615c74a974d7c055ecdf313fbf8ea5b48c6bc18bac0edf5241c611b971bc54320c3041f0b105c6a7e7ac4b361f7a51b7a00341ade71797a4385dbaefcf2d547346aa7910aab24330b3acf5ae1d160c56a12334e9be9bc46060ac19aed5c", 0xa7}, {&(0x7f0000000dc0)="8a441760866fe13b2ac2b5bd0ff3b0773c2c90e332f242eccad6ee695281b7dfc4aac59af7756cc10ae9", 0x2a}, {&(0x7f0000000e00)="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", 0xff}, {&(0x7f0000000f00)="5d143e470a15449873f3ad99772a1543c787036fc7ebe406d1e7239075e3558a343194fa390e8f514c61541e7ebf582813b914f549b289a0d6786cd53c2b770a25ab3e33345cd6afeb6b9527a478aae826721a9579fd864afcae1331b331811991b20f88bfe4e2ac493ea5bf1d9c86110d09c823549fc948407ccfb8b64586fb8a0da0dece00953d1826c91fc40bf09a0a2151", 0x93}, {&(0x7f0000000fc0)="ac8c05a51935bb920c0b5639c6f184cce7fd6f8c695ef70f8a6b7ea0d3ca15e5084c94e353db5e5b609d618bfeb4a941dc36ebeac0fd071290c60e4030491248225cb5aa9139760396f78c99ea9ce96e4714d5a9cd21c08d79df48a4d3ecba35be713a3e1ee93f80e3eae3ad549ec245b68669c4caed70a3def1fe05a549f22f484fd3424e8e6bd8f08056fbd59f598431eb10938210ed1f", 0x98}], 0x9, 0x0, 0x0, 0x4000000}, 0x9}, {{&(0x7f0000001100)=@ipx={0x4, 0x3ff, 0x400, "6bad67d528bd", 0x8}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001180)="97bad598ca265382ef7420cbf2d342e9f2823f28ddf0eab1e199da51cbf9408f183671efd728d55c734abc6320f912d0ac25327a347699c16e5f3617a3233674684a2702a77d11a37f94f45def2eebb06659aa1b2757c3341fb2657eafa6682de6d6c9086d5cd954d1ca2725f23928816920ec617ea407abfe3eb648579795b0423c9497d15b69ebd00f8c57eaa6e4c167a3dc1dc0b23cd10e109164eba195f1899eb18867ce48f1b1afbd25722bf304834a54b7640197c55e6407950386fe48218e9f0ddac5209c", 0xc8}, {&(0x7f0000001280)="cb7166f017ffce11c067c91a9dcd53392456f1493d799d9a384946aca3bd32f522224972696a350357f2d99e55e90a249115346b1fdd925b2a346ce6513f6a0e177bee6f423b8b676f10f53c964a76788f92ddb748bbdaa5d09ec14574e5132ed48bda8892dc798a906e9780fd6f2d5eb2acd282b3a6259207b65feda4e7199d694bfff9e55fd3df4ea62028facaf2af89d6edb436ad156cdbcf59d9ddc6d1c2ed3e93891476257b88250ae3ea62db", 0xaf}, {&(0x7f0000001340)="920271c1e5efa518c42a02350bde9517572dd3c96905b35cdc4b03f5f1602a23835270c70cbc11d852bf482847d682e8b888936016080f807658b46f5182873a57343f98679e2f16c0613426e963bc3f446334340b4e9d15ec56e6aa9709f9deb9884dccaa5f4b366a5f1129673dd50ec4385e12236bbcf9d6", 0x79}], 0x3, &(0x7f0000001400)=[{0xfc, 0x11, 0x100, "9773bc8839965fc3545bebf189a15c489ad84bd84f4410570aaa37bf157ed9f6dae8e5bded454c17e9170ea3594f5cb5bdbddec4895e5d235434ca530eeb909cbee0085062af7657dbe8c7f91e538c682f74424473b78a7794f5c7909f356baa74f9a3186eeabda15c19d6a7b8ed3d4acbb90abb77a1238ee77f23a14ae81453b1fa6657341e3eb4438b62af97f360241bb18698616b2382b84dcc951df06bac316e80cb98e94f50590f34b8c97128e4699c86defa8dc6852950e56e69291e756c59cb2a7f967675c163d89d5f85c81dd31d6c6073dc31ba53d5f5a570c8a220f87ed726f636eff39fc27beff0"}, {0x100c, 0x116, 0x0, "76a4b5c1fdc4abd28a42c8713aa988780dcf5b8c2ef761b8ee2e381aed412c624a52a40c8028af360eba74a2b0ff0f82bdfac1378d273e40bff486b210266aa20832548840f387a6fc69619cf77e807f6cc79d3488124282755c36f15b87408c8c4607a58b797ec1d415c582af82ce05650438031c07a47ca0b190ed8ee67a507f146292815ebddb0b102ef0cfa575ae686f11ff1bd57882ea31f8d68493d1eb86c53f09d529fb168408566eb2ffd56e82b1332c68fd3f11cd5a684abd4873263d0d45e1cd364cf83e43794db0bd7b0419b3655c93e5b2447f4f432d0513e0f008c3d49a824f2ae0e1fe1fa26c5171481280a8be0f767cfffd4482cd1856611377f23342fcadbb9f72bcba64b5f73eb3e0fe3815d705d32b49e3f637c3bd31c2cf410ff3f3cd27777850635f0350fd6ca7ad86d917cec5c52364a11e3ab9f8ed3c45488ee1ed7275ab1f05af1a4dfc7967409067abacaf817dbdf44dfefd615cd674ab41dddcffd9f531e56f88ba4b94e777389147e7c2199a1fee15c6bfd9d9b09cc44d82f5fd7e64856e7d33dafe63688db7bbe1dd147a99ead5b74e2cc8cae332c31feaab713662f3825a85faebacd34ebe5d5d61912a8ac64dca263c766a644a42d361d4a7b30a7072d7357bead03f14b4fece0b8117b148fff0eed34b62833c55af44a838633ee5a6784c44c7237b6a726b8de27445926896810e8fd42a96de15c6af7a23ae6d7d0f1bb767a7ba22abaafdb42492243bf99bb5f17c7d6703c66da13ff57a4084140d75cd3932f226a8de6e78bceafb95e5b1d63b350a50419d53f7a2baeebe44fb8b97552aad98b0b7353837a80d6fe8e78d276be576721e1c028d2b577e3ac3452e2ff686756e2c3200da383f95ed082d4cd2b0b51d95e68c83b9b9f61ed1d30ec29e14d64296d372d35174c135bd73ea387fa39e7d0695bc16f8af698311e3fb86cc36cfac359181674c312d2de69398e4dde2c68777f3dbf34ad7db2366405048fc4cf542dc6f9c4d5eda055148659a5d00beafcc69e4a2a6355d8ce78d28e038ce966482b3d2943b7085bd2a239537bb2a0c1d304ee9ba74489588f9f84ee9d64980e3fe56dcc90a7ec3ee8cf008d6c8cd632a8de5c7688d7833001dd068b5464c726d80961a68220187f13af98fc8421389ad293ab5fb4261bea39dccf9b5871d28ad7e1dd1ea5b626d1eb9eb02c6c8a3eeb63d248ae3fa32e5f2487f2ca34c431fa99857715632d992ff83c81dba7cf2ec274945b03b25f4a760b60d3e6b8c5023ae21c5436d659b877fbc4235752dfd580dc47edc1c00b43ee736e1dd789a53cd9f17e5472524c2a45fea01ced84884ca972c82aa3dc245283007231878086d972d5a6fee2c6c3a3299f4bd852e650fbc26cef27833ead053d884b5cdd41891dbbc1234f79c5e871371068077fd9786fb5e2e65e695b4261bf6f38d1617924125f7c9049ca818d1a926b384be9cb3fc85f74e62a01e9c6c536ba297607badfd494dfacdf97b675c84b518cf1867a63520becf04d26f1866a9bf5579df35408e5850d1a5a52867d04432e83034903695acfcd814fbe7b00bdd90cd276911e2800a957060cf35e0ae5677178478c8593ebf9c109c1ddff872cf0c3f08dd2b30492b1f1a6fed8faa9eb0925b4cf2ef41c8852dff626296640756763d003dc10d822705a574361254385d4b571fc86ba005384312360249b34f192399ae46fc083f0b3f0658b5aa17fb84bd1e0f50654bb922b5c341fb72e52631506ac8cc48cd7ae6febda2644c845f918996f7a00653bc2f59c3a7f10d940ef09782ea7bfdcacd56a793c0e64ee1e65349dd8626fbf47407ac6ebcdf90f2efadcd8cf4d4079800f1c7d3bdffee7d7772a5b30732be7c6cad15b7df6fa0b1c4e86b4241af51363c99a271a1990ee09e24d3e3eab09b604dab899fba601970fc593e2a37190bd9b778ab52b4dd066674f96980d6fd32df46aa977a38c85dae14af73488039be14cbab40332b053fe07f640906ced01f3eb9f75559cf6b30f168414d5e54017a0d6976034ad04dbdf9d22610623fc60664fb39642a2f5830443a2ba6cb83c215afbfaed19b848c3423454f9decb768c2eef5675585b694da9fbf5b3bcb5d7addb56e67437a06af600d6da5ed93a03efa452687ab7c99be6501c346c86a73703b59215c473e0acd15cf396ddb9850c3c4829465822a3dfda99309175b6cf6ff2e688ca2621b5de94ccb2489a28b12233a175426bfba4cf0eabed14ff65b81dc4a4f5728bf4aae7cce28c435efecb93f46d8319ac70858364d34fc941761fa0142dc8544758d3c6279eb1a230dc2e9d3cc085eaec60df2d27a73badf9b00e151ab302894a56574b42fb932c9c84260e7dff334897a44069b1ea6893fb982e50411ad970ac8fbfef8d200359b2a7d93e5370fba654e1746b8fdc8d663f337cc51a9876f91aac5fa6538df9bb2422a434c1b536f5cbf6eb86385a7f2528ea5c9e2980c1a1481c572453e794f51b687be4dbca63a9c66a6dc9d146864e4e2edd1614b7c6c2c2c20b3ab129e5e0f9de733de104192646e7d40548165e95d0789de4dcb048ed46bdadfe815a418c7356abd5b4be78a4165a417cfce72fc75f36a575af1b4fd53e3621f987549505be6eefb882f067eb1ec673bbc11dc185bb8d968b709142ed82e88efa618348846729e87f5f5b6e432b3316dcc556898e7b00197f16cccf92682830de150f2e55f93a332a0cd17dd3e4b85d41465f4a19d0b09f2b11e1b8dd7fb1cdd147bbcca5d23a33380655e5920a9835c1869ce5a74c662979ebeef8865b802f54d1e72c240e3c935ff30f032070ce28d57134c8f0ffac3630260e7ffaf90ea74f843050bfc585d76e9215104706d5130a236a7bb9db00b89385a251c3de737f39a97e68e744621b4d8c647b6d1565c78e3f04dc904da21a9498ed0ef63fff20a7577c6b58749bff2a13cc06ce359226eba87d5ff539393e59b10b94ecebb6c5377dd3b17ea0994a951a0173ba9d07c208499389018c5595e37e25062c6f0f735518c4a49f4f4089c2d399e7ab0036c869839214be3b2689eb55e8259464e111bb9977af13a73c225d108c1f3b9e0ce74f89f2142dcba157f7def25409d88fa01a23c2a2a908ac54839894fb655df54532b487751e2bf1da4755deba3ceade5e6d50384f16737af3663a61d9e4e73abd570c0d9525d41c51ae02f5984d76c8196bd10451557515aab43f594717af49685929ecd45c47f3e628797b85ccd6c6c4a02a36c42e51b43f0c147148b6b552deff1636d4982ac13735e5f36d8609651c1b0c38bff0c2f1d6dc59cfd2daed2b8568f1d6a19442c12a18aae57d4eea8cc68ad34d726b6db51e0a1414a56b574970967e04220fad8daf6f4ce0c4468c983283222f8482d00f9386f7874b5d143304bb6b776a8517ed2566831c773e58be2559c3d51e9814d70c3e99de8c3beea65e1e92c94f0e5a5ca1d16860614d61bff67e941ef7c28cab69daf836ed62c05c4b6137e5586e26af27d524db728e5ddcffa6b5fd1bdc38146129a2c411d57001bb23b3e9c6ca168cea0a230a04320d2808c2562a538e5017365e8f70d98d05d4196fcb1b2e32160440cc95f836c6d96d1aa014f692b6868b2bfc8e6f0d90550c884b4d0fde00847b2e2afb0d079436e4b7b0e6325ae2d4be112a44e913de54224a8d5fc529af9cf9320cdac9cacbd9946b09994286772a1a2fbc3dcb2c8423fd86f9f54ef74d7c1648a3bc75d883dec6831a04d6eb6671b8db2bd3c84de9ac541671980ecfd224eaa42c64067d8b5c44da6c37d6cfdf110707493289eaacc08fa9ddd713da57c14320bd4a3ecb77e2a3dddbe25447ff97a4f1cbd2ec1afe4533c840121d108428129ed7f00e634c7233a16425ec84a7aeb0720b6f1c7682b516368348daab4702b20fc711c85876c681bd54ab630d7df648ea0a963245a24ef46782b46a481f3fa80f0550d38aa20ca5fe3d227db436de7a97d961816d84cc1e9fdf379a04cea860d271cb389be87eb379e8838c26417b87e1689cc4e1eecef43bb3be7b583eff366c242fdd269a966d9e1b91a12a9ec547ad615621d16a1541fd84f67daede6b0042a927c388034ae8ada120b97d48f1bb225d24f52c9de6bdc59950e97f1637a8eeb11f315e574eb87f22aa47ff82d40bb6fdfc36e16ab6d1addc32e97b02904b2fa22eafd8c539970a7d1b498f381cef5d44c1ff9a22c1633a5bd01453e58d37043eaca722a79687c6fa7f969ff083cb99966f4b6b778f86ff1cdb8061ac84d416f517e64adf30ea6ffa586762c02e1ef099a59e04372d1490501dfa6157da982a426af78fa76235630ba1bc2cc4caa983074c4e364afe580726228adbead6064fbca4e41fbb51bbb545cc43763cd3099a7535dd1e1bfa29e73dc24a464cde65920472a106ff16d7b681de0209b8463584eba4f95a3c6eafcd6936bfd340a3061433698ce8aad73ff2028b89242559870cc1083553dd0fd323eab10eca01c41fd61d6a2c9963729e6ebbdbabcc43d448d3239a330fa2899945cef7d3e79c8c060891b7c702cb0f11eb471ec950952cc0075d6d5b23fcb2c080ffcc0296fb5e559309baaa7378f9448d4f22cb7ad5ae5862e806fa80defbacf95ef93f78c4db27f80dacecd6b7bc59e336f3ab5f82a38c1d498ef2931b5edac8371e32cf34035ecc3ad86115e6eb0ae082b465f9f90ccc53fd3e85f5c4db2a857518c23054d769718305bf8aa88eafbc3d12b7327a9b5801bed92b66d4c1984f0e20779a78fed2d0ac4d8e53d49da77e8290cfb83c95c8702846b84345e38e6a7afc16213950554ae5cf2fab66d26cecffd6faf6b1bb3adf75c4c711a4c9770f299c8047dc862c08c7f9a42dc29089bba776e7504589b57872d24c1b6857ae422d2723dacb7a307cf300c0cda61017b4d7601272bce429776eb39921280cfca6d1b4cd97bba57f693f10f55e7ed56061b1b9395b98a670b2b80ee7486a36beedde28a1d1a27e9d0972195541df976acfa396e8c24cd09215e4448e578d996a2626106ebdffcdd33e4bf957c7cca26957d3809d6adc2350939e2a6283d75a2556c097184b7730110b00a4512d8c4ca214f51bb8b2c41070ffe0ce71270a3f8dbc87cd7453b74eb24d2995240aa7cf3192a7758337b887ff7c763a41c580f92e079c8d022782d4b01adb2fc65fb58b568a1c3728dafbd2d36c9724057a99bee9931f8aa2d5dcc80af78459e47263608eccdb7d02cd2ae610a14e9517b017fc77b78df1bd243ebb2bb9fb13d94b22401e30102f30dc21010f2c11fc6afd3c55ed80eb97436315b3086cd0fbac43f857ff0f225ae8e2f142a230716464d26e42095b22c0833b2fa88c9e1ce4a84abaf8a56ab979f4e5a5fb51c093b51907cb68dd39c7778e854e52d923ddbb474956af74a144ef7103eacfd520aba72d547a8d335913e61788c921b65a4e48adeb7d1bd764899c01ede9cf92f9020b2520193945f10e24948d9dec088e9ccda528e36412b4b0332cf707436c0bdc2c283f69728768a0da34c74b07542a44d75038a08be9a0bbf276fb344f38ad4951159b3ad000dba2de677db25554567246aebdf9496b26a5d6bd2d6124d9b9c0bfc0b9440baf8ced53178bcbfdb6bcfedcf8ec4dcf7b0a485db9f9b9f72b5400a3672f2eb0ba893c36506a3c865be4eb4197c1cf9932dd67e68e051e40927e31a80d410d7f5728aba2a2b5792d5b7a3a15823762e80db0c20a10d8c4d520ff7068f000a2594ac29"}, {0x24, 0x3a, 0x2, "472cf17e32db4a9d9ea3b7967ca47e776dc6f4653464"}, {0xd0, 0x6, 0x69a4, "9eafef5124d31a03f49e47e69258108123bf9a59d2b7db46c76c91512575d04b78408e997f6e6e15e2001fcc32b1532b25d9a48d51ee11cc4da71b7f533e3f4e1c2ca5ae93e3500ea9b9af244b76b2782c5e2aa47c44dee3b454a49419a8ea1e7dcf4f5e76b913b9e33553524e37db8ed7705f2e41a3a747c2371f35ee4ba6888759e46f2609ac013bb7a2cf7309279e57bd717975a754cce7a01f683d7031caa854ac6b055115c4d1fe2e308e0bc3180b92c52680abc5add294816d8161a70b18c3"}], 0x11fc, 0x4}, 0x8}, {{&(0x7f0000002600)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x1, 0x3, 0x2, {0xa, 0x4e24, 0x4, @mcast2, 0x1000}}}, 0x80, &(0x7f0000002740)=[{&(0x7f0000002680)="ef5888f5b9aaa78a66363ee333621b595886158b", 0x14}, {&(0x7f00000026c0)="301703bf0b7a6b32f921123bfbe476cca2b5f287d9", 0x15}, {&(0x7f0000002700)="1168c3534375", 0x6}], 0x3, 0x0, 0x0, 0x8000}, 0x81}, {{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000002780)="b2d5f12886e82252bee4100c70e3290f5e94af292e8436a3a6c4659b227adce3e5c4476caa7db3dddf32a8be92f2796b1f202da0c612cf02bb636011141b7e82f4e2f772423db0fde3f112727d5d777d5bf0447794305cf2c830a0e45a98c07174b5799723dfcab50ed9527d2d3b1a1765529b79ea57afbdfd22915382d8fa6d308d698df5e8c51191985ad3a3bdb5246cd67083e1379aef4f7e95c78f846af4", 0xa0}], 0x1, &(0x7f0000002880)=[{0x6c, 0x112, 0x10001, "c2d540dcbe8fe214857d2dbefd9f25b5090f0063340d4c8442e5dfe1b54046ea5dad5c4b00aedd65bebe3f83bc66e4d3689bb485a531212953b7a48907462810a280308c14cfa770b9b49679a5b51f59cfe8f3b468489aabf288d54e1bf82dc2"}], 0x6c, 0x40000}, 0xffffffff}, {{&(0x7f0000002a80)=@can={0x1d, r3}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002b00)="d181ccebeb73900d5172dd61c39a01482137c15e6a56ac77d56381271626a2a667f7f0c18e879645747fc80fed64068e5e64b5a1ae1a148592663611706e6ab38a7707c2c70eeb3ec6399b440f19a31fd9", 0x51}, {&(0x7f0000002b80)="41a981b8a207d5de7457f4e0df972139f40b68c426e99476248a5c876c28713582dc20a2ab2ae8a15ff006cfe781a8eda74aa4ae6ac34cf8498a7c81c5dc186448050f3ac9b21aff87464e51685a511b0fb7786777a15f23dd5a5be91fe8562d33e967c0b5a0a33f02ca2544512fc0f7c8f948554d75b50676199c2b", 0x7c}, {&(0x7f0000002c00)="0e011912ea3d7380227b0a016f321c89ce58fa2cfd3a3e409b2100862608f07fb6ccaf03f69b8d7cdcce5d3bd7c02b9f916e994888c7646a17ea3093b9f7183ef05ad966156f7e30a702756ff370a71fe3b1293abd834546aa3775bb51d0957b2664354bfbe097f9a4f3d3284efb08e1697f8d4dbd432558b07d908e97545089d7c583714c50da5419c704fc9b911b4dc57a259b", 0x94}], 0x3, 0x0, 0x0, 0x1}, 0x3ff}, {{&(0x7f0000002d00)=@rc={0x1f, {0x4, 0x0, 0x5, 0x0, 0x9, 0x7f}, 0x7}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002d80)="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", 0x1000}], 0x1, &(0x7f0000003dc0)=[{0xd0, 0x0, 0x87, "95952fdb62fde67ac02e9c32634a4001929090b2b4ce96789d698a784332c7d7df4769e11c4320c72cd865f9b0970c6b9cfd2de458218042b30522d337c0a6bfd39120f0f928ead617d7bdd3baa0e60cc49b414e0171382bbb1f1bdbb18b92f5ae107ef9a2d71450ba142dffa823eb4cb8256004e8b97361ea167fb3dad30bf3d11b08af23a2f849128426aeceb6d0c43a026b52cc0a146f9bbf00a86d1e3eeb25a04a47b5365be786788c6acf2beee994128fc42f7099b450a1516bada2b58fce76"}, {0xb0, 0x117, 0xfffffffffffff4ec, "b9f181e1f65db2592c56e500b116587208be102951b98dde8e82383ff78ae575cfd8ef1ddc4edd8936167b6d56f32427862eab460570682a381049882fb7c138477992a04af4968881050eff7858563db06fe8059d61c2fd96c94e510d471ec401f4b0cb65d46417d9630ac4d5ef8b0c01710d0e3b4b80bfe4d72d70daa8237c9aa5c75a9554e78b79976b66e37e4d710e4aa66f19dd11fb1189da907a99f9d53609fb"}, {0xc, 0x10f, 0xfffffffffffeffff}, {0x10c, 0x103, 0x9, "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"}, {0x78, 0x19b, 0x20, "a3fcd8b7f7fae2b137128867489d928ba0c27ace22392bda30b9acb3e3a39395f3e5cde51174dc5bb6f6758682294322f51216c23e054b038c310306a30cd91f03ae6bd572c5689333a3807b6f5034cb0cde200acf7e11527d98e4f8fc280530799b836a39ecb20207a22058"}], 0x310, 0x40085}, 0x6}, {{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000004100)="45ae7850d6def0ebadf26c8308d6ef60f9afdfd5b8502f7f1b638e379b69e5e9dbf5a17af6d2391374e032fbee3a03f861814744a1315f424d7bbbc6504c33e4e996ed82ab8fe430b42df600219029bf17a7c8a81f787138d635b24c721ffec251c54fb2bf6f0ee27e81cf80fe538d965ef98d8505cfa2459097249e8c63b1a581e8c183bbc87d612711160c3eee69dd7ea5fc3391a0a90ccd676ff3c135fdf18441c83f3084d2494997beaef52c6e256e7fc7ba487ed7ee64437b7dcbc8d1ba6f9e89d96f70cfe6d367460b4f091724288576befc13a4", 0xd7}, {&(0x7f0000004200)="4b525a0aea823ebf0b3437769f43115facdb0589f5504e2dfda4bd8d58bc79f74af34dac193110a646cdfff342a5", 0x2e}], 0x2, &(0x7f0000004280)=[{0xc8, 0x118, 0x7, "4111385fe2f694d29944f0d5685ddb241e207978b917e2264ad61943b3ca9a9e47a28dd3f33717b6a37219b45088978a5f9edbc1d89d9238f7720214e6d686154247de5b90fec8275728ff64994aa62756bd9d7714b4a5c64c5b49dd0c59b363dba99335879be0874cb6bd83f82dcce6f52b40cf23cdb1595703f6546fdc0d22bda5773aeffdfb95ec76d559e3ee7dfb122a2ceb28915889e3850e6ae9f950c9650d65f255ccff48ec397d20952f83a3acc2a99aadecf67b24ad75ca"}, {0x88, 0x103, 0x0, "21c15d47bbac14fddf7c70a0ae4bb68c2c76e8e4e5abadfc0ce1456011a659f0c543506e9b7ddb1e333e728119444e320079733670a12c48d2e54b19037f73a98b2617100d7d93d966238925d445dce05d66e4066551cff5732c5936709e115cb2130a2c7a50b4c61e03865049a92ff34b86b90977e6e1faba3e72fd"}], 0x150}, 0x6}], 0x8, 0x40000) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:38 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf8610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x2000000]}) 20:14:38 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x13, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:38 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3f805}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xbd100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x12]}) 20:14:39 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41ec4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0xfffffdfd]}) 20:14:39 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0xee00, 0xee00]) fchown(r0, r2, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x0, 0x200000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x4, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x3, 0x4200) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x200000000000000]}) 20:14:39 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x90000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:39 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xff0f, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:39 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x4000000000000000]}) 20:14:39 executing program 0: syz_open_procfs(0x0, 0x0) eventfd2(0x9, 0x80000) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0xc85, 0x40, 0x40, 0xffffffffffff9b5e, 0x0, 0x401, 0x8, 0x4, 0xffffffffffffff17, 0x4, 0x0, 0x4, 0xffff, 0x2, 0x4, 0x5, 0xfffffffffffffe3d, 0x1, 0xfffffffffffffff7, 0x2, 0x8, 0xffffffffffffffff, 0x5138, 0xad7, 0x1, 0x4, 0x1, 0x95c, 0x0, 0x10001, 0x7, 0x328c, 0xffffffff00000000, 0xfffffffffffff399, 0x9, 0xffffffffffffffcc, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0x7}, 0x40, 0xfffffffffffffff7, 0x6b84, 0x7, 0x0, 0xff, 0x4226}, r2, 0x6, r1, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1382.134452] __nla_parse: 10 callbacks suppressed [ 1382.134464] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1382.423982] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:40 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf5f7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x1200]}) 20:14:40 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) dup3(r0, r0, 0x80000) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1382.604126] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1382.875476] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1383.041626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:40 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffffe4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110a4]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x2}) 20:14:40 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, r0, 0x8000000000000) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0)=0xf6e, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x9}, &(0x7f0000000280)=0x8) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f0000000c80)=""/227, 0xffffffffffffff8c) socket$inet6_sctp(0xa, 0x5, 0x84) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) 20:14:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0xfffffdfd}) 20:14:40 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000007c0)={0x9, 0x1}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000580)={@multicast1, @dev={0xac, 0x14, 0x14, 0x21}, 0x1, 0x2, [@remote, @rand_addr=0x8]}, 0x18) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r6, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000600)={r7, 0x95, "853c72909a93e3da1e1bd26406004fa9da94842513eda1536649ed62219ed24b611317676d45212659790c3a6b8590d57a14c8f4779c05d50573a97b45b4fc9d2f7aa512f91f61b46721a55c4562965b0893cf8692ef81a2a2eed80be1ff827d1bb0057ddb0ab20292dda2067d46a089ee7abc4d21c821bc13bb9948122c1fbedd10476fac14e859795ec53df2cc379aa13d627e22"}, &(0x7f0000000340)=0x9d) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) write$9p(r5, &(0x7f00000000c0)="4c6af880bf4e2fac0e0c29b0d469a99b4158bf89412fe5078b7ef9d44fc7260e129ad509ed94db42d81878d167fce851d32687200c077844a985cc61365abb3a9e25f8a29d998ecbf9f52998a5d2108a019d6255ba32787cc98ca9e8820f3ccf652053e8edd7d975fe58cfc0a7269de2018ae6a2e5ee7c701719c274c3498a2a388e28dc5ab87f6bb0f564673dae", 0x8e) ioctl$LOOP_SET_FD(r4, 0x4c00, r2) [ 1383.376330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:41 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x7a, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x4000000000000000}) 20:14:41 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f0000000000)=0x10001) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1383.600483] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1383.907324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:41 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x2000000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:41 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0xfdfdffff00000000}) 20:14:41 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0xfffffffffffffffa, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1384.080896] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1384.339609] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:42 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x820e000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9f10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0xfdfdffff}) 20:14:42 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$setown(r1, 0x8, r2) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x1200}) 20:14:42 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000000)={0x3, 0xfedb}) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x1e3c65c8) prlimit64(r3, 0xb, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) r4 = request_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='/dev/loop#\x00', 0xfffffffffffffffa) keyctl$update(0x2, r4, &(0x7f0000000280)="44eb9d55434394b81fb61f17be1c4ad3587071ce2315012f894fc80f495780b0c5ce30f73e979927db484fe432cc18f1f57b40695329f5f95b2a17960d276d6c3497a95dbb7360c88be19fb92b506b030e5b76166f8f9247ac1d2b5a723d3b940a4444a89094acae79df32aacdb27704df35dbdd61a86eb431727bb8f1078bf90e55affb337ceaa0795b7521b661ad4b2d5e2b21a0519b2eab5871b75d0fb25358ac8b8f8813f5d04289eeb8082a9604b3a8323f858359df0f1078454fe3373f38ae7ccbfc7ca37b7d58fd793a79678979e6a8b5b695a560b4a89c4afd7d3afd3cb586393a1c703fc34b768de3963a0f", 0xf0) 20:14:42 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf161060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x12}) 20:14:42 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000000)=0x80) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:43 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3f8030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x200000000000000}) 20:14:43 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) write$P9_RCREATE(r1, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x4, 0x3, 0x3}, 0x4}}, 0x18) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:43 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x300000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x89100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x1200000000000000}) 20:14:43 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) ioctl$VIDIOC_QBUF(r0, 0xc044560f, &(0x7f00000000c0)={0x4, 0xf, 0x4, 0x4000000, {0x0, 0x7530}, {0x6, 0x0, 0x3f, 0x7ff, 0x8, 0xffff, "b0ddf0a6"}, 0x4, 0x3, @offset=0x8, 0x4}) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:43 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x12000000}) 20:14:43 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000580)={0x1, 0xffffffff80000001}, 0x2) r3 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x3) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:44 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xfffff000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x40000000}) 20:14:44 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x1, 0x2, 0x9, 0x1, 0x8}) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:44 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xfdffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:44 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x2000000}) 20:14:44 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000000)='^ppp1md5sumcgroupcgroup\x00'}, 0x30) r1 = syz_open_procfs(r0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_int(r1, &(0x7f0000000300)="706964732e6d61780056de6ef4885a25357c91dbe101000100d1d92cd593f6b3fc430885981b14d6377240e235ddb1042baefbb2e593a44d34eab050e7677aa7a98e3b32220e61de9e405127b1e8d942eae79210cc4f1123f48602a29f5f61350cdaf587b4559572a1fba4a12fb3bb", 0x2, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1387.247482] __nla_parse: 11 callbacks suppressed [ 1387.267985] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:45 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xfdffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4c00]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6], 0x4000}) 20:14:45 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPOUT\x00', &(0x7f0000000880)="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", 0x10e, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x800) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1387.420571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x914a, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afc00d882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:45 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4080, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1387.752153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:45 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x3f00000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:45 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800c361077d078d17525e9ef9e20b9b33900", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:45 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) getsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f00000000c0)=""/156, &(0x7f0000000000)=0x9c) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1387.975835] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1388.256639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:46 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3ffff]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='net/ip6_tables_names\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ed, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1388.415814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1388.697420] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1388.938819] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:46 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x3000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:46 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0x3) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:46 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x402c560b, &(0x7f0000000040)={0x2, 0x44, &(0x7f0000000240)="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", {0x10000, 0x400, 0x20385655, 0x7, 0x6, 0x1, 0xa, 0x40}}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200), &(0x7f00000000c0)=0xae4877017f53bf2e) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110c0]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x10000000000000, 0x101000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:46 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000140)={0x1000, 0x4, 0xfc}) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000600)=0x8) pwrite64(r2, &(0x7f0000000280)="fae87e9e21c7fe67aca646b66b672ce3109ac8cb9d9f549916fd05aef4bb83cd602f37ee1f7eae895b53c4591ce0219ce5495607793fb34e6df09a481b152eee3ebf7cbfb31648307158b0825ce23fb5c8892c3f4d15a3d1e188eb5aefb1f046ef3bdfaeca14942a0dda90e9bb860e410bc3fdd0005773ac064be079ba5d447d2883412aaf7e9a2a20e9c9134b8c8d264dc47bd4cf252e06ede49ddfa3159781dc9d58338d94aae28b542307b872f90656350247e78502b267f57bd27be983840bffb6740bcaefb98e82403991517929405119b2fe9256359a5f", 0xda, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendto(r1, &(0x7f0000000880)="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", 0x1000, 0x5, &(0x7f00000000c0)=@sco={0x1f, {0x6, 0x9, 0x3, 0x167, 0x9, 0x3}}, 0x80) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000580)={0x29, @broadcast, 0x4e22, 0x4, 'sh\x00', 0x8, 0x8, 0x1d}, 0x2c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file1\x00', 0x0) [ 1389.336006] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:47 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x800000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) socketpair(0x9, 0x5, 0xff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:47 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1389.532916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:47 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf0ffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7400000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:47 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x5, 0x30, 0x0, 0xffffffff}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in={{0x2, 0x4e20, @local}}, 0xf9bf, 0x2, 0x3, 0x3, 0x42}, 0x98) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r4, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80206433, &(0x7f0000000000)=""/4) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:48 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x41ec5}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:48 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x206081) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x8, 0x4) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$poke(0x5, r2, &(0x7f00000001c0), 0x9) 20:14:48 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) splice(r1, &(0x7f0000000000), r0, &(0x7f00000000c0), 0x7, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x2000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@loopback}}, &(0x7f0000000500)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000540)={0x71, 0x7d, 0x1, {{0x0, 0x51, 0x1f, 0x0, {0x1, 0x2, 0x1}, 0x20080000, 0x7, 0xac, 0x100000000, 0xb, '/dev/adsp#\x00', 0x7, 'cpuset*', 0x1, ',', 0xb, '/dev/loop#\x00'}, 0xb, '/dev/loop#\x00', r2, r3, r4}}, 0x71) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f00000001c0)={0x2}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x1}) ioctl$TUNSETGROUP(r6, 0x400454ce, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x13) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RXATTRWALK(r5, &(0x7f0000000040)={0xf, 0x1f, 0x1, 0x82cf}, 0xf) 20:14:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:48 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) lremovexattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=@random={'trusted.', '$\x00'}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xffffffffffffffff, 0x0, 0xd) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:48 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x6c00000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:48 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) ioctl$KVM_PPC_GET_PVINFO(r2, 0x4080aea1, &(0x7f0000000280)=""/207) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:48 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) socket(0x0, 0x0, 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000000c0)="7794e148c4194e4fea2e947bbf35d1bfda03b5674b18dddac87142f19f2287288da61cebccd25075f75ef600baec063eb8976828ea950e80ddc408dbf06a3d1313253c28d391abf9550be56135dbb902d3e37ac709635bcccc0db28303c33eedf512df0c76687cdbca2b43d99241864b0692ddbd9854b564bc18c69f70099131fe1d8274abd2182bded1dd665351f9ea48fbbb0632e6a5262f49e0bdc062d22e501a", &(0x7f0000000300)=""/119}, 0x18) write$binfmt_misc(r0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x402c5828, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x1}) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:49 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3f7fd}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:49 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x24000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x100, 0x0) 20:14:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:49 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xffffff7f}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:49 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000580)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffff8, @ipv4={[], [], @multicast2}}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000640)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xffffffffffffff28, 0x0, 0x0, 0xfffffffffffffd51) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000000c0)={0x5, 0x3, 'client1\x00', 0x2, "7038848f191c895c", "dc90829dc8184870855f3ca25aaa1f5e0f0c6fc8dba735cec6d7562acd542955", 0x9, 0x8}) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) sendto$unix(r0, &(0x7f0000000280)="94ae2c225b3d9b43bf22d0a85a9ebdbd57f9e90e8aa1728f00282bb788ffd9cae6b16552d5eadb2a04b25414ae6b90b90bc96a4575f4879d763053574125cf655b3b28f400d243da01f9caa4a6c991ea67603572debf2b995d9dd9c030f676066ef3c291e3e227005dcf3ea07d833a0c22802ae69212fac7fccaca1361ceb78ed7ce579bc1791380b961c2dff6a431e2c60882155d580bcc3c6429694a1958db608058d3f98497735b76c5565411d76b9752aa687a96f757f01aa1b7ba9b3d0dd348a53b7b7148a311482f7ca8166976a92114c91924b523dc4e5560812160f2cc60f796394810af83a3260734841b7ed603d8ee884e2e", 0xf7, 0x4, 0x0, 0x0) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:14:49 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x8000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@security={'security\x00', 0xe, 0x4, 0x3a4, 0x0, 0x15c, 0x15c, 0x0, 0x254, 0x310, 0x310, 0x310, 0x310, 0x310, 0x4, &(0x7f0000000040), {[{{@ip={@multicast1, @remote, 0xffffffff, 0xff0000ff, 'syzkaller1\x00', 'bridge0\x00', {0xff}, {0xff}, 0x37, 0x0, 0x10}, 0x0, 0xfc, 0x15c, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x3, [0x10000, 0x80000001, 0xe211, 0x0, 0x3, 0x23d], 0x3, 0x0, 0x8}}}, @common=@icmp={0x24, 'icmp\x00', 0x0, {0x1f, 0x80000001, 0xffff, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1fe0000, [0xedf, 0x6, 0x2809, 0x5, 0x2a, 0x401], 0x3, 0x0, 0x5}, {0xfff, [0x1, 0x3, 0x5, 0x6, 0x81, 0x3f], 0xfffffffeffffffff, 0x0, 0xfffffffffffffff8}}}}, {{@ip={@rand_addr, @empty, 0xff000000, 0xff0000ff, 'yam0\x00', 'rose0\x00', {0xff}, {}, 0x4, 0x0, 0x20}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x200, [0x0, 0x7, 0x0, 0x7fff, 0x50, 0xff], 0x6, 0x0, 0x3}, {0x7fffffff, [0x8, 0x0, 0xffffffff00000001, 0x4, 0xa182, 0x3], 0x7, 0x3ff, 0x5}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x20}, 0xff, 0xff, 'syzkaller0\x00', 'bpq0\x00', {0xff}, {}, 0x0, 0x3, 0x1}, 0x0, 0x98, 0xbc}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x400) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) 20:14:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x19, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:49 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x3, 0x0, &(0x7f00000000c0)=""/82, &(0x7f0000000280)=""/137, &(0x7f0000000600)=""/165, 0xd000}) r1 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000340), &(0x7f0000000500)=0x4) prlimit64(0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000540)={r1}) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) sendto$unix(r2, &(0x7f00000007c0)="e5aa48efe1427ab1f5c7be3dabd032f7b81b872e51f777195d6a873ad7a0d961232daa7c3ed63b6c753e06ff8c018e99f8d9b8684e3c618693fa5b6e237485cb56505e9870f01f09b8a6f7cf549de971b633a0911fd318462cdb3ae859975ccd3d4c1ea847f22ace9e7b9b91d829c5c3e1fc", 0x72, 0x10, 0x0, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1392.268258] __nla_parse: 10 callbacks suppressed [ 1392.268273] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1392.671885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:50 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xee61060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000040)={0x1, 0x0, [{0x1000, 0xe3, &(0x7f00000001c0)=""/227}]}) 20:14:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11098]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1392.788268] QAT: Invalid ioctl [ 1392.981336] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:50 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x600000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:50 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) unshare(0x8000000) syncfs(r0) r1 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000080)=0x14, 0x0) sendmsg$alg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000002800)="7d9625ba593e75d4d90bfdebc6bb1dd2cf0723ee85abd65bf037ae9ad2d51c83240397d437ff93bb6b02e676a5d0e50708b11588a11e60a9d8b8316199d10025a401e39787e2f0becd5bc902c845c7d3327ae2efc07390e5905e7559d95822af2680cfdbcc3a920891a11d016f30a998888573d1dd049ea36cee4dbf203763566ec2ad9ed47ea6714188ab140ab36dc3a31921", 0x93}], 0x1, &(0x7f00000028c0), 0x0, 0x40000}, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6c00000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0xf3, @loopback, 0x8000}, {0xa, 0x4e21, 0x9, @empty, 0x8001}, 0x7, [0x227, 0x7, 0x10001, 0x1bd1, 0x0, 0x200, 0xfffffffffffffbff, 0x4]}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="d2e16cb8"], 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="b5bcdd65de1118717e6aa404c2d1f204321c5aa9bcbb51ebf22205779eaf255f94db37f99bbda06615ec88807e6a9adb50f5b918c8c6ec030361", 0x3a}], 0x1, &(0x7f0000000400)}, 0x10) set_mempolicy(0x8000, &(0x7f0000000400)=0xffffffffffffffc0, 0x7) r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x1c, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x2]}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r5) 20:14:50 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0xbe1e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110ca]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:50 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) getsockopt$inet6_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000280)=""/240, &(0x7f0000000100)=0xf0) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28}, 0x10) [ 1393.282644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1393.516316] IPVS: ftp: loaded support on port[0] = 21 20:14:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3ee]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1394.460002] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1394.733786] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8410010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1394.907649] device bridge_slave_1 left promiscuous mode [ 1394.913288] bridge0: port 2(bridge_slave_1) entered disabled state [ 1394.968627] device bridge_slave_0 left promiscuous mode [ 1394.974326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.075000] team0 (unregistering): Port device team_slave_1 removed [ 1395.087444] team0 (unregistering): Port device team_slave_0 removed [ 1395.101026] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1395.146147] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1395.209977] bond0 (unregistering): Released all slaves [ 1395.361160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:14:53 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x2000000000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:53 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x74000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7d100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1396.128057] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:54 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) [ 1396.665228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:54 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf0ffffffffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x181400) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40086410, &(0x7f00000000c0)={0xb, &(0x7f0000000040)="c5f840ba7c696cbe314eb3"}) 20:14:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe0100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:54 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1397.049643] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1397.398938] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1397.631055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1397.846597] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1398.028287] bridge0: port 1(bridge_slave_0) entered blocking state [ 1398.037695] bridge0: port 1(bridge_slave_0) entered disabled state [ 1398.045467] device bridge_slave_0 entered promiscuous mode [ 1398.084404] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1398.229875] bridge0: port 2(bridge_slave_1) entered blocking state [ 1398.238620] bridge0: port 2(bridge_slave_1) entered disabled state [ 1398.246166] device bridge_slave_1 entered promiscuous mode [ 1398.310993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1398.358372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1398.456328] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1398.491747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1398.648195] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1398.655680] team0: Port device team_slave_0 added [ 1398.692605] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1398.700866] team0: Port device team_slave_1 added [ 1398.733073] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1398.765998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1398.800044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1398.807207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1398.817077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1398.845007] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1398.852618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1398.861802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1399.196268] bridge0: port 2(bridge_slave_1) entered blocking state [ 1399.202748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1399.209519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1399.215980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1399.223780] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1400.097746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1400.405392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1400.524872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1400.643390] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1400.649940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1400.658594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1400.769256] 8021q: adding VLAN 0 to HW filter on device team0 20:14:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xbf100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) 20:14:59 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x311e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:59 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661ef, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:59 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x2f80300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:14:59 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0xfffbfffffffffffd, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x7}, 0x2) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_bt(r2, 0xdd17, &(0x7f00000000c0)="1f31085703ac937810ef80b2e86ad39022c1dc4cae") memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1401.568825] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:14:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10001, 0x0) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x0, 0x0, 0x7}, 0x6}}, 0x18) 20:14:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe6101800000fcddd882e3a361d49e0400d01e0ca6219a4b94f7", [0x6, 0x3]}) [ 1401.875506] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:14:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0xfffffffffffffffc, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:14:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffffffff000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:14:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0xb94, 0x7, 0x202, 0x2, 0x7ff, 0x5, 0x1, 0x7fffffff, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={r2, 0x1ff, 0x2, [0xb7, 0xa71d]}, 0xc) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x88000, 0x0) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000040)=0x3) 20:14:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x20000) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f00000000c0)="0f300f23a10f01ca0f01ca0f01cbf3906766c7442400e70000006766c7442402000000006766c744240600000000670f0114240fc7593f0f01cae9ae96", 0x3d}], 0x1, 0x1, &(0x7f0000000200), 0x0) [ 1402.180437] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:00 executing program 5: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1f, 0x0) 20:15:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xfffffffffffffffd, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000040)={r1, r2+10000000}, &(0x7f00000000c0)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "be4fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x87b]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x8100, 0x0) r4 = openat(r3, &(0x7f00000003c0)='./file0\x00', 0x24002, 0x20) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000200)={0x18, 0x1, 0x0, {0x2}}, 0x18) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) futex(&(0x7f0000000240)=0x2, 0x8b, 0x1, &(0x7f00000002c0)={r5, r6+30000000}, &(0x7f0000000300)=0x2, 0x1) [ 1402.492635] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1402.753672] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:00 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:00 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x3, 0x7, 0x10000}, 0x10) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89e3, &(0x7f00000000c0)={'syzkaller0\x00', @ifru_flags=0x4902}) r2 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x15, 0x4) 20:15:00 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110f5]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:00 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x68, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:00 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xffffff7f}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1402.989832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1403.275892] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xeb10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x10f, 0x2, 0x8000, 0x23a, 0x24b, 0x8, 0x136}, "ec948e0e3a97e733cc8c0d8b3104a4961b25c3b00abab9c51c7e045b5c6c3dd19e9c91c68278c59f7f9d6111fd4094a9e93832f78bb7c0af45548df4d88bc3d97c518a6ad96800a175f41d0b09ebcf49b8bbbce8115875fbcf17ad718237d8eeebcda8965dc6b1ff2a2adf6d8b614e955787750415f27dc4777a28daaa6278c13713a284a8f70b7dece3c8966a66ddea2a797532a9e9141ef7406b84b7c29893737a195404a6d365c7960d59314e753fb35f72a76d88c29853289dbfa108799049e2", [[], [], [], []]}, 0x4e2) [ 1403.486438] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10100, 0x4) syz_open_pts(r2, 0x1ca40) ioctl$TIOCNOTTY(r1, 0x5422) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x10001, 0x5, 0xffffffff, 0x2, 0x3, 0x0, 0x0, 0xb45, 0x1, 0x4, 0xffffffffffffffff, 0x7ff, 0x5, 0xffffffff], 0x3000, 0x80000}) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000280)=0x1, 0x4) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1403.753640] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:01 executing program 5: clock_adjtime(0x7, &(0x7f0000000000)={0xa8d, 0x2, 0x7fff, 0x0, 0x1, 0x1e, 0x3, 0x2, 0x3, 0xf37, 0x3ff, 0x3, 0x7, 0x7, 0x1, 0xfff, 0xfffffffffffff001, 0x1f, 0xc8, 0x0, 0x7f, 0xfff, 0x6, 0x63f2, 0x6, 0x9}) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:01 executing program 0: r0 = syz_open_procfs(0x0, 0x0) lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000600)) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x0, 0x0, 0x0) write$binfmt_misc(r3, 0x0, 0x3c6) recvfrom(r2, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffee5) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000000000000000000040b7dd000004000000010000007ec20000060000000500000000db0b0000000000000000000700008008000000020000000400000000000000b800000000000000000000000000000267add300"]) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r4, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001940)={0x0, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000001a00)=0x84) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000001b40)={0x5, @local}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001a40)={r6, @in6={{0xa, 0x4e21, 0x800, @loopback, 0x9}}, 0x7fffffff, 0x80, 0x4412, 0x5, 0x7fffffff}, &(0x7f0000001b00)=0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000580)={0x0, 0x8}, &(0x7f0000000680)=0x8) write$UHID_INPUT(r4, &(0x7f0000000900)={0x8, "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", 0x1000}, 0x1006) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000880)={r7, 0x7f2279f6, 0x7f, 0x6, 0x80000000, 0x5}, &(0x7f00000008c0)=0x14) prlimit64(r5, 0x0, 0x0, 0x0) r8 = syz_open_procfs(r5, &(0x7f0000000000)='fdinfo\x00') listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'yam0\x00', r9}) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1404.065889] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:01 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x7a}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1404.300244] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:02 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xc61e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x402, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x3, 0x1, 0x4, 0xfff, '\x00', 0xea}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb8100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:02 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x6000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1404.506497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x4a4b) [ 1404.782992] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) socketpair(0xb, 0x8000f, 0x10000, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$UI_SET_PHYS(r1, 0x4004556c, &(0x7f0000000040)='syz1\x00') 20:15:02 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x40000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0xfffffffffffffffe, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2e, 0xffffffffffffffff, 0x15, 0x9, "d64fececdba4977f0337cdff9aeb4778d1382edbc994cb2622aa9e7376e70175b9b33900", "e8a7736b3ad2fe61154fab1629ea7829000000009ea5efd41e0ca6219a4b97f7", [0x6]}) 20:15:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x15, 0x10, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe61d882e3a361d49ebdefd0000000000000000500", [0x806, 0x800000000000]}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) getpeername$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000240)=0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt(r3, 0xffffffffffff0777, 0x5, &(0x7f0000000280), 0x0) ioctl$BLKTRACESETUP(r0, 0xc0401273, &(0x7f00000001c0)={[], 0x2f9, 0x5, 0x400, 0xffffffffffffff8d, 0x80000000, r1}) 20:15:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c00]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:03 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xffffff9e, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:03 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf9f7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:03 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xe4ffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x3c, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x10000, 0x0) 20:15:03 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000d77000/0x4000)=nil, 0x4000}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:03 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110d7]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:03 executing program 5: socketpair(0x7, 0x80e, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x9) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'bcsh0\x00', {0x2, 0x4e24, @rand_addr=0x2}}) 20:15:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800000000015, 0x800000018, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436f3bd2fe614026731af8ddd877e30500d49ea5efd01e0ca6219a4b97f7", [0x9, 0x3]}) 20:15:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) 20:15:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x42601, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x10002001) 20:15:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x115, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x7) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:04 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x4800000000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xcf8030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1407.505199] __nla_parse: 9 callbacks suppressed [ 1407.505212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:05 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x7a000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc3ffffff00000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0xa, 0x1, 0x4, "2ed86bd2699ef9ef8efd3a717223bd8e495b5fcdb965bf015142545def7dba33e0882b973d392feac794e6a1d7955246fccc4ece62c429451f624144c5e45044", "a8fb4aa03730b8f8acc4a0d2a0a6ebf29f52d4f41382b2391cc090d829f0ac9b00c891a4ed6a98dc8b1b90c9d4a77b36e18da1063487912229ffcd6e6b84ffe0", "1cb664114272673a76be24c2413eb406a9d71e1c6845f1d212ebaafd0ee5c606", [0x2, 0xa89e]}) 20:15:05 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000000)='./file1/file0\x00', 0x80002, 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:05 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000000)) fcntl$setpipe(r1, 0x407, 0xd07) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) 20:15:05 executing program 0: r0 = gettid() r1 = syz_open_procfs(r0, 0x0) clone(0x100102102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x80000000000002, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r2, &(0x7f00000000c0)=""/184, 0xb8, 0x0, 0x0, 0x38a) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000280)="98d2241e4edf227a23cbee999d844643db0bbeb50438c8f9947a54301c37d09d583c0d268ea2b290508da0b0f328e3f557aeb2ed5f6824be7acfd1b382566659710e5be2bbccc626ad474470cec33328d6e00c14eaa5d0c8733c3cbe38fa2b941668e3b01dc89296454fd3a02feac949871f675949c8d351ba8bac4b7fcb3c1eb13d0428d52f1f3a68140864ca4854d5bad038b4cdcf9e69f012f3590556f0d37203d9f4f6fd2d245bf6c73f19e33bdec0a81e527e2b8e8c7b3ed2ab8d3d0494f8a88df57e9af8c894efb2") syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) geteuid() ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000880)={"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"}) prlimit64(r4, 0x1, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) open(&(0x7f0000000000)='./file0\x00', 0x1, 0xee41664f255ccff5) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000180)=0x3, 0x4) [ 1407.910307] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) epoll_create(0x7) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) 20:15:05 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000880)={0x8, 0x120, 0xfa00, {0x4, {0x9, 0x4, "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", 0x37, 0x1, 0x0, 0x0, 0x0, 0x4bc40fda, 0x1, 0x1}, r3}}, 0x128) 20:15:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xeb100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1408.284793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1408.505800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:06 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xe6610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1408.686687] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x4c000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1408.941904] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:06 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x41e38}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000040)) 20:15:06 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:06 executing program 0: syz_open_procfs(0x0, 0x0) clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0xffffffffffffffff) move_pages(r2, 0x9, &(0x7f00000004c0)=[&(0x7f00001a7000/0x4000)=nil, &(0x7f00001a9000/0x3000)=nil, &(0x7f00001a9000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00001a9000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00001a6000/0x3000)=nil, &(0x7f00001a8000/0x1000)=nil, &(0x7f00001a8000/0x1000)=nil], &(0x7f00000005c0)=[0x6, 0x101, 0x1, 0x1000, 0x5, 0x2, 0x200, 0x4, 0xff], &(0x7f0000000cc0)=[0x0], 0x6) mmap(&(0x7f00001a8000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000c80)='/dev/loop#\x00', 0x0, 0xfffffffffffffffd) r3 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000000)=0xc) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) prlimit64(r4, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)=@known='trusted.overlay.impure\x00', &(0x7f0000000880)=""/212, 0xd4) recvmsg(r0, &(0x7f0000000c00)={&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000600)=""/106, 0x6a}, {&(0x7f0000000980)=""/170, 0xaa}, {&(0x7f0000000a40)=""/141, 0x8d}, {&(0x7f00000007c0)=""/122, 0x7a}, {&(0x7f0000000b00)=""/128, 0x80}, {&(0x7f0000000280)=""/15, 0xf}, {&(0x7f0000000b80)=""/124, 0x7c}], 0x7, 0x0, 0x0, 0xc72}, 0xde16ffa6e65fa39c) setxattr$trusted_overlay_nlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L+', 0x1ff}, 0x28, 0x3) close(0xffffffffffffff9c) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1409.134411] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1409.252757] IPVS: ftp: loaded support on port[0] = 21 20:15:07 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x10c0802, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f00000001c0)=0x1f) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) fstat(r2, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000240)) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) [ 1409.430336] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000040)=""/48) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226581afcddd882e3a3e1d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1409.768113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4, 0x5, @mcast2, 0x10001}], 0x1c) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000000c0)={'bpq0\x00', {0x2, 0x4e20, @multicast1}}) 20:15:07 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000240)={0x20, "8c2afbd9b83dbf87a250205ea9ed505c7287c527059673236055e49f46257e22", 0x3, 0x7fff, 0x0, 0xff06ff, 0x2}) [ 1410.065493] IPVS: ftp: loaded support on port[0] = 21 20:15:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = fcntl$dupfd(r0, 0x406, r0) utimensat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}, {0x0, 0x7530}}, 0x0) [ 1410.147876] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:08 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x190, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:08 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x500}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:08 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xc21e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:08 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) write$FUSE_LK(r0, &(0x7f00000004c0)={0x28, 0xffffffffffffffff, 0x2, {{0x1, 0xffffffff, 0x0, r1}}}, 0x28) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000200)=0xe000000000000000, 0x4) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f00000002c0)) write$P9_RGETATTR(r2, &(0x7f0000000300)={0xa0, 0x19, 0x2, {0x400, {0x80, 0x4, 0x6}, 0x100, 0x0, r3, 0x3, 0x777, 0xfffffffffffffff8, 0x7, 0x2, 0x100000000, 0x9, 0xfffffffffffffa5e, 0x20000000000, 0xffffffff, 0x58, 0xb, 0x0, 0x5, 0x2a}}, 0xa0) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) r4 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x9, 0x2000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000500)={0x0, 0x3c, "7d400357f6a5852ccaa92ae9ac8d49fc7bdf6c3fca8abfa6d97a1f9616de8c6257ee084bd341a751ae3fc1ae365573e3b4aea3f974cd790fd3b7dc73"}, &(0x7f0000000580)=0x44) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000005c0)={0x2, 0x8000, 0x8, 0x92, r5}, &(0x7f0000000600)=0x10) r6 = getpgid(0x0) write$cgroup_pid(r4, &(0x7f00000001c0)=r6, 0xffffffffffffffe5) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) write$FUSE_WRITE(r0, &(0x7f0000000240)={0x18, 0x0, 0x2, {0x12}}, 0x18) 20:15:08 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xaa10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:10 executing program 0: clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r0, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r1, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2000000, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2, 0x11, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1f, 0x10000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e24, 0x5, @mcast1, 0x890}}, 0x42, 0xc}, &(0x7f0000000080)=0xfffffffffffffeee) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000000c0)={r2, 0x8, 0x9, 0x20}, &(0x7f0000000280)=0x10) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) 20:15:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110cb]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:10 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661f6, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:10 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x97ffffff}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:10 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x361e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7ffe, 0x3) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0x7, 0x4) socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) prctl$PR_SET_TSC(0x1a, 0x2) [ 1413.194639] __nla_parse: 7 callbacks suppressed [ 1413.194651] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:11 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x0, 0x0, 0x0) write$binfmt_misc(r0, 0x0, 0xfffffcd4) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r4 = memfd_create(&(0x7f00000009c0)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r5, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) getpeername$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") bind$xdp(r6, &(0x7f0000000140)={0x2c, 0x5, r7, 0x2b, r3}, 0x10) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:11 executing program 5: clock_getres(0x7, &(0x7f0000000000)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614281000000ddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x103]}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) [ 1413.606571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:11 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x14002512, 0x101000) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1f, 0xd, 0x1f, 0x4, "c9d896d7577b6177ed52a46d8e17852af765f470d2ba4acd148996c4af2e8c1ec9b3de461e65bc12cc8bbb8ccccbd447d2bdd6ef174f16f357d3a149342bc008", "470f7647d108d161ad94253989e6bc5fadc2292a629f8693f518c0b15c4f8281", [0x1, 0x3]}) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:11 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110e6]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:11 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x5485ba6614928263, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x608801, 0x0) write$FUSE_STATFS(r1, &(0x7f00000001c0)={0x60, 0xfffffffffffffff5, 0x5, {{0x2, 0x9, 0x8, 0x8, 0xaa1, 0x8001, 0xca1a, 0x4}}}, 0x60) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x280000, 0x0) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000040)={0xffff}) [ 1413.908610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:11 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1d24, 0x80000) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/83) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "d92a436b3ad2fe614226731afcddd882e3a361d49ebba755d81caec15f4b97f7", [0x6]}) [ 1414.205614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:12 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x661f9, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:12 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x3f7f4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1414.514444] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:12 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xff0f0000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xde10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ustat(0x2, &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x60000) bind$inet6(r1, &(0x7f0000000580)={0xa, 0x4e20, 0x8, @empty, 0x1}, 0x1c) write$P9_RLOCK(r1, &(0x7f00000000c0)={0x8, 0x35, 0x1, 0x1}, 0x8) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000280)={0x0, 0x5, 0x100, &(0x7f0000000240)=0x5}) ioctl$TCXONC(r1, 0x540a, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) syz_open_procfs(r2, &(0x7f0000000200)='net/llc\x00') 20:15:12 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mknodat(r0, &(0x7f0000000000)='./file1\x00', 0xc005, 0xfffffff9) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(r2, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r3, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) [ 1414.698911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x1) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000080)=""/18) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="04739fc46cec4afd19afa2210000066c0da515fddc25cb54d707a1fdf45ef9b89b6a", @ANYRES16=r2, @ANYBLOB="20002cbd7000fcdbdf2509000000"], 0x14}, 0x1, 0x0, 0x0, 0x8050}, 0x20000000) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1, 0x20) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe61a726731abcddd882e3a361d41ea5efd01e1130219a4b97f7", [0x6, 0xfa]}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000240)=0xffff, 0x8) [ 1414.997411] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:12 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb610010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1415.239955] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1415.507740] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:13 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) prlimit64(r2, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000000)) 20:15:13 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xfa61060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1415.754767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:13 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc710010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:13 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xfffffffd}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:13 executing program 5: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:14 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x20000) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x121000) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000040)={0x6, 0x1, 0x39990e3f}) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f00000001c0)={0x0, 0x3, @start={0x5, 0x1}}) 20:15:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0100100]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:14 executing program 0: r0 = syz_open_procfs(0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) getpid() r2 = getpid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x0, 0x0, 0xfffffffffffffd51) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000001880)=""/242) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000880)="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") r3 = memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000280)={'filter\x00', 0x0, 0x3, 0x69, [], 0x4, &(0x7f0000000000)=[{}, {}, {}, {}], &(0x7f00000000c0)=""/105}, &(0x7f0000000140)=0x50) prlimit64(r4, 0x0, 0x0, 0x0) listxattr(&(0x7f0000000240)='./file1\x00', &(0x7f00000006c0)=""/227, 0xe3) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) 20:15:14 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200)={0x7f, 0x3, 0x1, 0x6}, 0x8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x800) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@mcast1, 0x17, r1}) r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:14 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf0ffffff00000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd802e3a361d49ea5efd01e0ca6219a4b87f7", [0x6, 0x2000000000000]}) 20:15:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110ba]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:15 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xffffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) socket$inet6(0xa, 0x0, 0x8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f00000001c0)) 20:15:15 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x700}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:15 executing program 0: 20:15:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xee03000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:15 executing program 0: 20:15:15 executing program 0: 20:15:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) socket$vsock_stream(0x28, 0x1, 0x0) [ 1418.079176] QAT: Invalid ioctl [ 1418.085451] QAT: Invalid ioctl [ 1418.300501] __nla_parse: 7 callbacks suppressed [ 1418.300514] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:16 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xe8610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:16 executing program 0: 20:15:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x12, 0x18, "d64fececdbf1fc677f69b145907815e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0xfffffffffffffffa]}) 20:15:16 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7400]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) [ 1418.591684] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1418.860096] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1419.011628] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1419.181381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:17 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf0ffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:17 executing program 0: 20:15:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xfff, 0x7, 0x1c, 0x10, "09586bfb8a50388416be7a832d5d8b685408449e781c2c5087cbae368a5cbbb9a286aa2f75772c3632ae4efe7813f5432773a7d1deccb64a944782f9be530704", "bfb295ec7c4342cf4cf3dda1799b4aefb2a52065a36d034ce5138ed58dcdb8b7", [0x800, 0x9d]}) 20:15:17 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x400000000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:17 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x41eca}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1419.352271] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 20:15:17 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x227a, 0x710000) 20:15:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1419.650895] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:17 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614281000000ddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6, 0x103]}) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) 20:15:17 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x48, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80047601, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x10, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337d1ff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e701752500009e20bdb339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) 20:15:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x4000) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1420.202929] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 1420.356097] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1420.531160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x110a8]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:18 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xf2f7030000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x448000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:18 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x341e040000000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x10000000000001, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x15, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000000)={0x14000000}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x81, 0x900) close(r1) epoll_create(0xfbc) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x7bc8f54c, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e23, @remote}}) 20:15:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1420.944449] [drm:drm_calc_timestamping_constants] *ERROR* crtc 29: Can't calculate constants, dotclock = 0! 20:15:19 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf0ffffffffffff, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x3fffffe) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xed10010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000000)={0x14000000}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x81, 0x900) close(r1) epoll_create(0xfbc) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x7bc8f54c, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e23, @remote}}) 20:15:19 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x100000, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:19 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000000)={0x14000000}) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x81, 0x900) close(r1) epoll_create(0xfbc) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x7bc8f54c, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e23, @remote}}) [ 1423.311137] __nla_parse: 5 callbacks suppressed [ 1423.311151] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:22 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x97ffffff00000000}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:22 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x630001, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xffffffffffffffff, 0x0) 20:15:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf210010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:22 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xc21e0400}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:22 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xf361060000000000, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in=@broadcast, @in=@multicast1, 0x4e23, 0x6ee8, 0x4e23, 0x1, 0xa, 0x80, 0x20, 0x8, 0x0, r2}, {0x80000001, 0x2, 0x1, 0x81, 0x3, 0x3, 0xfb7, 0x5}, {0x4, 0x0, 0x6, 0x1ff}, 0x7fff, 0x6e6bb1, 0x2, 0x0, 0x2, 0x3}, {{@in=@loopback, 0x4d4, 0x6c}, 0x2, @in6=@remote, 0x3507, 0x3, 0x3, 0xff, 0x3, 0x8, 0x4fc}}, 0xe8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1424.525201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 20:15:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xfffffffffffffff9, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x80000001, 0x6}) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000200)={'vcan0\x00', 0x800000001}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4018641b, &(0x7f00000000c0)={&(0x7f0000fef000/0x10000)=nil, 0x9, 0x3, 0xa8, &(0x7f0000ff3000/0x3000)=nil, 0x2}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 20:15:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f00000004c0), 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x4}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)='/dev/kvm\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000400), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[], 0x0, 0x680}) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:22 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200000, 0x30) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x200800) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000200)="65dfe467c375ff76152814918068a0bf4882ca95affcb59ab1f7d47fefaf6201756ce7959145713fc002486d7f658621043188eeed4399a5fc8993aa71673e26de3b8d89", 0x44}, {&(0x7f0000000280)="e77f84983724222b836fa3ac5301e1fbdba62649fed787adb65b1858c4f95fca6446d7d05470f6affad48d8fb1f3b1d0017fcc390db9c8bf48", 0x39}, {&(0x7f00000002c0)="df961ab032dc37deb30c97c51377dad0851cade8117637f54be9eff9fa57a9eace2aa5b03b5b971ef1c5ab56328e683fd022a0e58d54d44d3c59923b48a0a4b3ddcb42f2a6efc1eab2e90474689dcfeb22cfe624c93fd48fa6306b56e2ed8acaa0efdb0ed14bb3ee451824faf7e9a29f58dc62016c980c585d8cf41d5142afc753fdaa644af699a435ca29aba04368", 0x8f}], 0x3, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4005, 0x40) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f00000001c0)=""/255) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000002c0)=0xb) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e23, @local}], 0x10) 20:15:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x4000) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) [ 1425.731435] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1426.542211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 1426.853189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. 20:15:24 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0xfaf70300}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:24 executing program 0: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) unshare(0x8000000) syncfs(r0) r1 = accept4(0xffffffffffffff9c, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000080)=0x14, 0x0) sendmsg$alg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000002800)="7d9625ba593e75d4d90bfdebc6bb1dd2cf0723ee85abd65bf037ae9ad2d51c83240397d437ff93bb6b02e676a5d0e50708b11588a11e60a9d8b8316199d10025a401e39787e2f0becd5bc902c845c7d3327ae2efc07390e5905e7559d95822af2680cfdbcc3a920891a11d016f30a998888573d1dd049ea36cee4dbf203763566ec2ad9ed47ea6714188ab140ab36dc3a31921", 0x93}], 0x1, &(0x7f00000028c0), 0x0, 0x40000}, 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x6c00000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0xf3, @loopback, 0x8000}, {0xa, 0x4e21, 0x9, @empty, 0x8001}, 0x7, [0x227, 0x7, 0x10001, 0x1bd1, 0x0, 0x200, 0xfffffffffffffbff, 0x4]}, 0x5c) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000040)=ANY=[@ANYBLOB="d2e16cb8"], 0x4) set_mempolicy(0x3, &(0x7f0000000000)=0x401, 0xfe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)="b5bcdd65de1118717e6aa404c2d1f204321c5aa9bcbb51ebf22205779eaf255f94db37f99bbda06615ec88807e6a9adb50f5b918c8c6ec030361", 0x3a}], 0x1, &(0x7f0000000400)}, 0x10) set_mempolicy(0x8000, &(0x7f0000000400)=0xffffffffffffffc0, 0x7) r5 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x15, 0x1c, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x2]}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r5) 20:15:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_acct\x00') ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f00000001c0)={0x8, [0x5, 0x400, 0x2, 0x1, 0x6, 0x4, 0xf63, 0x64]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) 20:15:24 executing program 1: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x6800}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 20:15:24 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sysinfo(0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xc910010000000000]}, @empty, @loopback}) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) getpgrp(0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) 20:15:24 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={0x10000, {0x2, 0x4e23, @loopback}, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e21, @multicast2}, 0x8, 0x9, 0xfff, 0x9, 0x8, &(0x7f0000000100)='lo\x00', 0x685b, 0x800, 0x1}) r2 = socket$inet6(0xa, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0xffffffffffffffff, 0x9, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x13, 0x0, 0x0, 0x1, 0x0, r3, 0x1a}, 0x2c) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r3) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000007c0)={'ah\x00'}, &(0x7f0000000800)=0x1e) getsockname(r2, &(0x7f0000000580)=@generic, &(0x7f0000000240)=0x80) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0xea610600, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 1427.141253] device bridge_slave_1 left promiscuous mode [ 1427.146767] bridge0: port 2(bridge_slave_1) entered disabled state 20:15:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x1d, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x18, 0x4, "d41df61829f2bbda71b364255933d01e149db72418c777e57d387b0b6ad5da4c1f936b69603dd47417813697724fe465ed6717da58c69089195227df8bb2ceec", "14f07d19ced7812a71364e6314a55b0fcef6811b287f0c9d5b1e36569c2317fbef7958d46523238878aec61898a8c97772358844538f8fb9cf1a07d0d7b9a9b2", "8bcd5e5ddc2c142e5ca86eba91faf0fabdd913843590767c2a3cc912c3072e74", [0x1, 0x5]}) [ 1427.202724] device bridge_slave_0 left promiscuous mode [ 1427.213572] bridge0: port 1(bridge_slave_0) entered disabled state 20:15:25 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x7, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1427.508485] [ 1427.510158] ====================================================== [ 1427.516471] WARNING: possible circular locking dependency detected [ 1427.522770] 4.20.0-rc5+ #264 Not tainted [ 1427.526819] ------------------------------------------------------ [ 1427.533125] syz-executor5/19801 is trying to acquire lock: [ 1427.538726] 00000000b1252389 (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 1427.546792] [ 1427.546792] but task is already holding lock: [ 1427.552741] 00000000dd1fab58 (&lo->lo_ctl_mutex#2){+.+.}, at: lo_compat_ioctl+0x11b/0x170 [ 1427.561079] [ 1427.561079] which lock already depends on the new lock. [ 1427.561079] [ 1427.569393] [ 1427.569393] the existing dependency chain (in reverse order) is: [ 1427.576998] [ 1427.576998] -> #2 (&lo->lo_ctl_mutex#2){+.+.}: [ 1427.583061] __mutex_lock+0x166/0x16f0 [ 1427.587454] mutex_lock_nested+0x16/0x20 [ 1427.592016] lo_release+0xa3/0x1f0 [ 1427.596058] __blkdev_put+0x4f6/0x830 [ 1427.600361] blkdev_put+0x98/0x540 [ 1427.604405] blkdev_close+0x8b/0xb0 [ 1427.608539] __fput+0x385/0xa30 [ 1427.612329] ____fput+0x15/0x20 [ 1427.616122] task_work_run+0x1e8/0x2a0 [ 1427.620514] exit_to_usermode_loop+0x318/0x380 [ 1427.625600] do_syscall_64+0x6be/0x820 [ 1427.630003] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.635696] [ 1427.635696] -> #1 (loop_index_mutex){+.+.}: [ 1427.641501] __mutex_lock+0x166/0x16f0 [ 1427.645893] mutex_lock_nested+0x16/0x20 [ 1427.650457] lo_open+0x1b/0xb0 [ 1427.654186] __blkdev_get+0x360/0x13c0 [ 1427.658576] blkdev_get+0xc1/0xb50 [ 1427.662618] blkdev_open+0x1fb/0x280 [ 1427.666851] do_dentry_open+0x499/0x1250 [ 1427.671422] vfs_open+0xa0/0xd0 [ 1427.675209] path_openat+0x12bc/0x5150 [ 1427.679596] do_filp_open+0x255/0x380 [ 1427.683897] do_sys_open+0x568/0x700 [ 1427.688114] __x64_sys_open+0x7e/0xc0 [ 1427.692418] do_syscall_64+0x1b9/0x820 [ 1427.696821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1427.702516] [ 1427.702516] -> #0 (&bdev->bd_mutex){+.+.}: [ 1427.708226] lock_acquire+0x1ed/0x520 [ 1427.712530] __mutex_lock+0x166/0x16f0 [ 1427.716919] mutex_lock_nested+0x16/0x20 [ 1427.721487] blkdev_reread_part+0x1e/0x40 [ 1427.726136] loop_reread_partitions+0x163/0x190 [ 1427.731307] loop_set_status+0xb95/0x1010 [ 1427.735991] loop_set_status_compat+0xa4/0xf0 [ 1427.740991] lo_compat_ioctl+0x13a/0x170 [ 1427.745610] compat_blkdev_ioctl+0x3ca/0x1b30 [ 1427.750645] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1427.755998] do_fast_syscall_32+0x34d/0xfb2 [ 1427.760840] entry_SYSENTER_compat+0x70/0x7f [ 1427.765745] [ 1427.765745] other info that might help us debug this: [ 1427.765745] [ 1427.773865] Chain exists of: [ 1427.773865] &bdev->bd_mutex --> loop_index_mutex --> &lo->lo_ctl_mutex#2 [ 1427.773865] [ 1427.785231] Possible unsafe locking scenario: [ 1427.785231] [ 1427.791268] CPU0 CPU1 [ 1427.795934] ---- ---- [ 1427.800578] lock(&lo->lo_ctl_mutex#2); [ 1427.804709] lock(loop_index_mutex); [ 1427.811004] lock(&lo->lo_ctl_mutex#2); [ 1427.817566] lock(&bdev->bd_mutex); [ 1427.821279] [ 1427.821279] *** DEADLOCK *** [ 1427.821279] [ 1427.827363] 1 lock held by syz-executor5/19801: [ 1427.832007] #0: 00000000dd1fab58 (&lo->lo_ctl_mutex#2){+.+.}, at: lo_compat_ioctl+0x11b/0x170 [ 1427.840754] [ 1427.840754] stack backtrace: [ 1427.845236] CPU: 0 PID: 19801 Comm: syz-executor5 Not tainted 4.20.0-rc5+ #264 [ 1427.852575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1427.861908] Call Trace: [ 1427.864492] dump_stack+0x244/0x39d [ 1427.868104] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1427.873278] ? vprintk_func+0x85/0x181 [ 1427.877153] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 1427.882849] ? save_trace+0xe0/0x290 [ 1427.886564] __lock_acquire+0x3399/0x4c20 [ 1427.890697] ? mark_held_locks+0x130/0x130 [ 1427.894934] ? mark_held_locks+0x130/0x130 [ 1427.899155] ? __lock_acquire+0x62f/0x4c20 [ 1427.903371] ? find_held_lock+0x36/0x1c0 [ 1427.907420] ? mark_held_locks+0x130/0x130 [ 1427.911638] ? _raw_spin_unlock_irq+0x27/0x80 [ 1427.916123] ? print_usage_bug+0xc0/0xc0 [ 1427.920175] ? print_usage_bug+0xc0/0xc0 [ 1427.924220] ? print_usage_bug+0xc0/0xc0 [ 1427.928263] ? compat_start_thread+0x80/0x80 [ 1427.932654] ? zap_class+0x640/0x640 [ 1427.936350] ? print_usage_bug+0xc0/0xc0 [ 1427.940394] ? __lock_acquire+0x62f/0x4c20 [ 1427.944614] lock_acquire+0x1ed/0x520 [ 1427.948403] ? blkdev_reread_part+0x1e/0x40 [ 1427.952725] ? lock_release+0xa00/0xa00 [ 1427.956694] ? perf_trace_sched_process_exec+0x860/0x860 [ 1427.962130] ? mark_held_locks+0x130/0x130 [ 1427.966363] ? blkdev_reread_part+0x1e/0x40 [ 1427.970669] __mutex_lock+0x166/0x16f0 [ 1427.974551] ? blkdev_reread_part+0x1e/0x40 [ 1427.978867] ? mark_held_locks+0x130/0x130 [ 1427.983083] ? mark_held_locks+0xc7/0x130 [ 1427.987211] ? blkdev_reread_part+0x1e/0x40 [ 1427.991514] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1427.996602] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1428.001170] ? mutex_trylock+0x2b0/0x2b0 [ 1428.005228] ? trace_hardirqs_on+0xbd/0x310 [ 1428.009532] ? kasan_check_read+0x11/0x20 [ 1428.013665] ? finish_wait+0x25d/0x430 [ 1428.017543] ? trace_hardirqs_off_caller+0x310/0x310 [ 1428.022639] ? zap_class+0x640/0x640 [ 1428.026337] ? zap_class+0x640/0x640 [ 1428.030043] ? print_usage_bug+0xc0/0xc0 [ 1428.034095] ? zap_class+0x640/0x640 [ 1428.037803] ? print_usage_bug+0xc0/0xc0 [ 1428.041874] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1428.046981] ? find_held_lock+0x36/0x1c0 [ 1428.051028] ? mark_held_locks+0xc7/0x130 [ 1428.055160] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1428.060246] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1428.065336] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1428.069904] ? trace_hardirqs_on+0xbd/0x310 [ 1428.074213] ? kasan_check_read+0x11/0x20 [ 1428.078345] ? __wake_up_common_lock+0x1d0/0x330 [ 1428.083085] ? trace_hardirqs_off_caller+0x310/0x310 [ 1428.088172] ? percpu_ref_resurrect+0x2f0/0x4b0 [ 1428.092824] ? trace_hardirqs_off_caller+0x310/0x310 [ 1428.097926] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1428.103017] ? __wake_up_common_lock+0x1d0/0x330 [ 1428.107764] mutex_lock_nested+0x16/0x20 [ 1428.111813] ? mutex_lock_nested+0x16/0x20 [ 1428.116039] blkdev_reread_part+0x1e/0x40 [ 1428.120171] loop_reread_partitions+0x163/0x190 [ 1428.124823] ? __loop_update_dio+0x6b0/0x6b0 [ 1428.129221] loop_set_status+0xb95/0x1010 [ 1428.133355] loop_set_status_compat+0xa4/0xf0 [ 1428.137856] ? loop_set_status+0x1010/0x1010 [ 1428.142257] lo_compat_ioctl+0x13a/0x170 [ 1428.146298] ? lo_ioctl+0x1d60/0x1d60 [ 1428.150087] compat_blkdev_ioctl+0x3ca/0x1b30 [ 1428.154567] ? bfq_create_group_hierarchy+0x120/0x120 [ 1428.159741] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1428.164310] ? bfq_create_group_hierarchy+0x120/0x120 [ 1428.169484] __ia32_compat_sys_ioctl+0x20e/0x630 [ 1428.174229] do_fast_syscall_32+0x34d/0xfb2 [ 1428.178536] ? do_int80_syscall_32+0x890/0x890 [ 1428.183102] ? entry_SYSENTER_compat+0x68/0x7f [ 1428.187678] ? trace_hardirqs_off_caller+0xbb/0x310 [ 1428.192695] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.197522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.202349] ? trace_hardirqs_on_caller+0x310/0x310 [ 1428.207348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1428.212348] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1428.217350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1428.222183] entry_SYSENTER_compat+0x70/0x7f [ 1428.226584] RIP: 0023:0xf7fb7a29 [ 1428.229963] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1428.248869] RSP: 002b:00000000f5fb30cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 1428.256685] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000004c02 [ 1428.263953] RDX: 0000000020000100 RSI: 0000000000000000 RDI: 0000000000000000 [ 1428.271212] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1428.278470] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1428.285740] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 20:15:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x80800) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@mcast1, @in=@multicast2, 0x4e20, 0x2, 0x4e21, 0x0, 0xa, 0x20, 0x20, 0x89, 0x0, r2}, {0x9, 0x9, 0x1f, 0x9, 0x401, 0x2, 0xf2e, 0x1000000000000000}, {0x400, 0x4, 0x8, 0xfffffffffffff801}, 0x3, 0x6e6bbe, 0x2, 0x0, 0x1, 0x3}, {{@in=@multicast2, 0x4d2, 0xff}, 0xa, @in6=@loopback, 0x3502, 0x3, 0x3, 0x2, 0x2, 0x3ff, 0x400}}, 0xe8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1428.308023] loop_reread_partitions: partition scan of loop7 (ÖOììÛñʦ{6™Ž!æ×M¶Ô¤¤—7ÍÿšëG±…€ µwÐxÑ8.ÛÉ”Ë&"ªžsvçu%éïž ¹³) failed (rc=-13) [ 1428.330674] kobject: 'loop7' (00000000f2a53e96): kobject_uevent_env [ 1428.337148] kobject: 'loop7' (00000000f2a53e96): fill_kobj_path: path = '/devices/virtual/block/loop7' [ 1428.373097] kobject: 'loop5' (00000000c879de2a): kobject_uevent_env [ 1428.383320] kobject: 'loop5' (00000000c879de2a): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:15:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x80) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) ioctl$DRM_IOCTL_VERSION(r1, 0xc0246400, &(0x7f0000000300)={0x507fa0bd, 0x4, 0x101, 0x0, &(0x7f00000000c0), 0xd4, &(0x7f00000001c0)=""/212, 0x0, &(0x7f00000002c0)}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000002c0)=[@in6={0xa, 0x4e22, 0x40, @loopback, 0x4ac}], 0x1c) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0)) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) [ 1428.739146] kobject: 'loop5' (00000000c879de2a): kobject_uevent_env [ 1428.745645] kobject: 'loop5' (00000000c879de2a): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:15:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@v1={0x2, "ffc84cc263170b1106aaf5e8f3cf75"}, 0x10, 0x3) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x18, "d64fececdbf1caa67b36998e032115e6d74db6d4a4a4977f0337cdff9aeb47b185800cb51077d078d1382edbc994cb2622aa9e7376e7017525e9ef9e20b9b339", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) [ 1428.926057] kobject: 'loop5' (00000000c879de2a): kobject_uevent_env [ 1428.935161] kobject: 'loop5' (00000000c879de2a): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:15:26 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x800000000420000, 0x0) ioctl$BLKBSZSET(r0, 0x40041271, &(0x7f0000000040)=0x2) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f00000003c0)={@local, @remote}, 0x8) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x18, "d64fececdbf1d4a47a8bca80fd1077d078d1382edbc9944f2622aa9e7376e7017525e9ef9e20b9b339000000000000000000000000000000000000000700", "e82a436b3ad2fe614226731afcddd882e3a361d49ea5efd01e0ca6219a4b97f7", [0x6]}) ioctl$RTC_AIE_OFF(r0, 0x7002) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)={0x20000013}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) recvfrom$packet(r0, &(0x7f00000001c0)=""/179, 0xb3, 0x2000, &(0x7f0000000380)={0x11, 0x11, r3, 0x1, 0x100, 0x6, @link_local}, 0x14) [ 1429.066341] kobject: 'loop5' (00000000c879de2a): kobject_uevent_env [ 1429.074223] kobject: 'loop5' (00000000c879de2a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1429.289103] kobject: 'loop5' (00000000c879de2a): kobject_uevent_env [ 1429.296888] kobject: 'loop5' (00000000c879de2a): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1429.437946] kobject: 'rx-0' (000000009b4caed5): kobject_cleanup, parent 00000000bc67d158 [ 1429.446426] kobject: 'rx-0' (000000009b4caed5): auto cleanup 'remove' event [ 1429.453821] kobject: 'rx-0' (000000009b4caed5): kobject_uevent_env [ 1429.460351] kobject: 'rx-0' (000000009b4caed5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.470591] kobject: 'rx-0' (000000009b4caed5): auto cleanup kobject_del [ 1429.477618] kobject: 'rx-0' (000000009b4caed5): calling ktype release [ 1429.484203] kobject: 'rx-0': free name [ 1429.488250] kobject: 'tx-0' (00000000eb2932f6): kobject_cleanup, parent 00000000bc67d158 [ 1429.496481] kobject: 'tx-0' (00000000eb2932f6): auto cleanup 'remove' event [ 1429.503607] kobject: 'tx-0' (00000000eb2932f6): kobject_uevent_env [ 1429.509954] kobject: 'tx-0' (00000000eb2932f6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.520035] kobject: 'tx-0' (00000000eb2932f6): auto cleanup kobject_del [ 1429.526922] kobject: 'tx-0' (00000000eb2932f6): calling ktype release [ 1429.533543] kobject: 'tx-0': free name [ 1429.537602] kobject: 'queues' (00000000bc67d158): kobject_cleanup, parent (null) [ 1429.546005] kobject: 'queues' (00000000bc67d158): calling ktype release [ 1429.552813] kobject: 'queues' (00000000bc67d158): kset_release [ 1429.558892] kobject: 'queues': free name [ 1429.563210] kobject: 'þ€' (00000000e5b80fb3): kobject_uevent_env [ 1429.569380] kobject: 'þ€' (00000000e5b80fb3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.618124] kobject: 'rx-0' (00000000d0ab8fe8): kobject_cleanup, parent 00000000afba7afa [ 1429.626442] kobject: 'rx-0' (00000000d0ab8fe8): auto cleanup 'remove' event [ 1429.633638] kobject: 'rx-0' (00000000d0ab8fe8): kobject_uevent_env [ 1429.640009] kobject: 'rx-0' (00000000d0ab8fe8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.650093] kobject: 'rx-0' (00000000d0ab8fe8): auto cleanup kobject_del [ 1429.656964] kobject: 'rx-0' (00000000d0ab8fe8): calling ktype release [ 1429.663602] kobject: 'rx-0': free name [ 1429.667556] kobject: 'tx-0' (000000006cf7a101): kobject_cleanup, parent 00000000afba7afa [ 1429.675770] kobject: 'tx-0' (000000006cf7a101): auto cleanup 'remove' event [ 1429.682913] kobject: 'tx-0' (000000006cf7a101): kobject_uevent_env [ 1429.689277] kobject: 'tx-0' (000000006cf7a101): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.699352] kobject: 'tx-0' (000000006cf7a101): auto cleanup kobject_del [ 1429.706225] kobject: 'tx-0' (000000006cf7a101): calling ktype release [ 1429.712818] kobject: 'tx-0': free name [ 1429.716721] kobject: 'queues' (00000000afba7afa): kobject_cleanup, parent (null) [ 1429.725134] kobject: 'queues' (00000000afba7afa): calling ktype release [ 1429.731916] kobject: 'queues' (00000000afba7afa): kset_release [ 1429.737916] kobject: 'queues': free name [ 1429.742268] kobject: 'þ€ð' (0000000022fe515d): kobject_uevent_env [ 1429.748604] kobject: 'þ€ð' (0000000022fe515d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.759334] kobject: 'rx-0' (00000000a924b4b8): kobject_cleanup, parent 00000000f93a1f8b [ 1429.767637] kobject: 'rx-0' (00000000a924b4b8): auto cleanup 'remove' event [ 1429.774733] kobject: 'rx-0' (00000000a924b4b8): kobject_uevent_env [ 1429.781117] kobject: 'rx-0' (00000000a924b4b8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.791216] kobject: 'rx-0' (00000000a924b4b8): auto cleanup kobject_del [ 1429.798364] kobject: 'rx-0' (00000000a924b4b8): calling ktype release [ 1429.804962] kobject: 'rx-0': free name [ 1429.808958] kobject: 'tx-0' (0000000092e356d8): kobject_cleanup, parent 00000000f93a1f8b [ 1429.817193] kobject: 'tx-0' (0000000092e356d8): auto cleanup 'remove' event [ 1429.824318] kobject: 'tx-0' (0000000092e356d8): kobject_uevent_env [ 1429.830684] kobject: 'tx-0' (0000000092e356d8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.840782] kobject: 'tx-0' (0000000092e356d8): auto cleanup kobject_del [ 1429.847671] kobject: 'tx-0' (0000000092e356d8): calling ktype release [ 1429.854233] kobject: 'tx-0': free name [ 1429.858207] kobject: 'queues' (00000000f93a1f8b): kobject_cleanup, parent (null) [ 1429.866610] kobject: 'queues' (00000000f93a1f8b): calling ktype release [ 1429.873377] kobject: 'queues' (00000000f93a1f8b): kset_release [ 1429.879392] kobject: 'queues': free name [ 1429.883690] kobject: 'veth3' (000000003275beca): kobject_uevent_env [ 1429.890116] kobject: 'veth3' (000000003275beca): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.901037] kobject: 'rx-0' (000000005a0453c8): kobject_cleanup, parent 000000001e8c0a16 [ 1429.909307] kobject: 'rx-0' (000000005a0453c8): auto cleanup 'remove' event [ 1429.916402] kobject: 'rx-0' (000000005a0453c8): kobject_uevent_env [ 1429.922736] kobject: 'rx-0' (000000005a0453c8): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.932900] kobject: 'rx-0' (000000005a0453c8): auto cleanup kobject_del [ 1429.939864] kobject: 'rx-0' (000000005a0453c8): calling ktype release [ 1429.946441] kobject: 'rx-0': free name [ 1429.950441] kobject: 'tx-0' (000000006287c5fa): kobject_cleanup, parent 000000001e8c0a16 [ 1429.958709] kobject: 'tx-0' (000000006287c5fa): auto cleanup 'remove' event [ 1429.965809] kobject: 'tx-0' (000000006287c5fa): kobject_uevent_env [ 1429.972189] kobject: 'tx-0' (000000006287c5fa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1429.982274] kobject: 'tx-0' (000000006287c5fa): auto cleanup kobject_del [ 1429.989203] kobject: 'tx-0' (000000006287c5fa): calling ktype release [ 1429.995785] kobject: 'tx-0': free name [ 1429.999712] kobject: 'queues' (000000001e8c0a16): kobject_cleanup, parent (null) [ 1430.008162] kobject: 'queues' (000000001e8c0a16): calling ktype release [ 1430.014918] kobject: 'queues' (000000001e8c0a16): kset_release [ 1430.020920] kobject: 'queues': free name [ 1430.025228] kobject: 'veth2' (00000000b0901d84): kobject_uevent_env [ 1430.031654] kobject: 'veth2' (00000000b0901d84): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.098108] kobject: 'rx-0' (00000000685b4f86): kobject_cleanup, parent 0000000046414dad [ 1430.106464] kobject: 'rx-0' (00000000685b4f86): auto cleanup 'remove' event [ 1430.113790] kobject: 'rx-0' (00000000685b4f86): kobject_uevent_env [ 1430.120288] kobject: 'rx-0' (00000000685b4f86): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.130462] kobject: 'rx-0' (00000000685b4f86): auto cleanup kobject_del [ 1430.137335] kobject: 'rx-0' (00000000685b4f86): calling ktype release [ 1430.143942] kobject: 'rx-0': free name [ 1430.147936] kobject: 'tx-0' (000000008a3d0c22): kobject_cleanup, parent 0000000046414dad [ 1430.156156] kobject: 'tx-0' (000000008a3d0c22): auto cleanup 'remove' event [ 1430.163676] kobject: 'tx-0' (000000008a3d0c22): kobject_uevent_env [ 1430.170058] kobject: 'tx-0' (000000008a3d0c22): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.180153] kobject: 'tx-0' (000000008a3d0c22): auto cleanup kobject_del [ 1430.187047] kobject: 'tx-0' (000000008a3d0c22): calling ktype release [ 1430.193668] kobject: 'tx-0': free name [ 1430.197624] kobject: 'queues' (0000000046414dad): kobject_cleanup, parent (null) [ 1430.206027] kobject: 'queues' (0000000046414dad): calling ktype release [ 1430.212819] kobject: 'queues' (0000000046414dad): kset_release [ 1430.218851] kobject: 'queues': free name [ 1430.223263] kobject: 'þ€' (00000000422ab8c4): kobject_uevent_env [ 1430.229549] kobject: 'þ€' (00000000422ab8c4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.240330] team0 (unregistering): Port device team_slave_1 removed [ 1430.247264] kobject: 'rx-0' (00000000f9bbef8e): kobject_cleanup, parent 000000008fd0c981 [ 1430.255573] kobject: 'rx-0' (00000000f9bbef8e): auto cleanup 'remove' event [ 1430.262724] kobject: 'rx-0' (00000000f9bbef8e): kobject_uevent_env [ 1430.269084] kobject: 'rx-0' (00000000f9bbef8e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.279175] kobject: 'rx-0' (00000000f9bbef8e): auto cleanup kobject_del [ 1430.286027] kobject: 'rx-0' (00000000f9bbef8e): calling ktype release [ 1430.292967] kobject: 'rx-0': free name [ 1430.296887] kobject: 'tx-0' (00000000327bfde5): kobject_cleanup, parent 000000008fd0c981 [ 1430.305178] kobject: 'tx-0' (00000000327bfde5): auto cleanup 'remove' event [ 1430.312528] kobject: 'tx-0' (00000000327bfde5): kobject_uevent_env [ 1430.318898] kobject: 'tx-0' (00000000327bfde5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.328981] kobject: 'tx-0' (00000000327bfde5): auto cleanup kobject_del [ 1430.335850] kobject: 'tx-0' (00000000327bfde5): calling ktype release [ 1430.342514] kobject: 'tx-0': free name [ 1430.346429] kobject: 'queues' (000000008fd0c981): kobject_cleanup, parent (null) [ 1430.354870] kobject: 'queues' (000000008fd0c981): calling ktype release [ 1430.361639] kobject: 'queues' (000000008fd0c981): kset_release [ 1430.367643] kobject: 'queues': free name [ 1430.371988] kobject: 'team_slave_1' (0000000047ec793b): kobject_uevent_env [ 1430.379032] kobject: 'team_slave_1' (0000000047ec793b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.391460] kobject: 'rx-0' (00000000e58b7e11): kobject_cleanup, parent 000000004ab75bc7 [ 1430.399729] kobject: 'rx-0' (00000000e58b7e11): auto cleanup 'remove' event [ 1430.406824] kobject: 'rx-0' (00000000e58b7e11): kobject_uevent_env [ 1430.413179] kobject: 'rx-0' (00000000e58b7e11): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.423785] kobject: 'rx-0' (00000000e58b7e11): auto cleanup kobject_del [ 1430.430890] kobject: 'rx-0' (00000000e58b7e11): calling ktype release [ 1430.437644] kobject: 'rx-0': free name [ 1430.441570] kobject: 'tx-0' (000000003a891b8d): kobject_cleanup, parent 000000004ab75bc7 [ 1430.449866] kobject: 'tx-0' (000000003a891b8d): auto cleanup 'remove' event [ 1430.456965] kobject: 'tx-0' (000000003a891b8d): kobject_uevent_env [ 1430.463656] kobject: 'tx-0' (000000003a891b8d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.473752] kobject: 'tx-0' (000000003a891b8d): auto cleanup kobject_del [ 1430.480646] kobject: 'tx-0' (000000003a891b8d): calling ktype release [ 1430.487213] kobject: 'tx-0': free name [ 1430.491180] kobject: 'queues' (000000004ab75bc7): kobject_cleanup, parent (null) [ 1430.500259] kobject: 'queues' (000000004ab75bc7): calling ktype release [ 1430.507037] kobject: 'queues' (000000004ab75bc7): kset_release [ 1430.513053] kobject: 'queues': free name [ 1430.517376] kobject: 'veth1_to_team' (00000000ae93e795): kobject_uevent_env [ 1430.524505] kobject: 'veth1_to_team' (00000000ae93e795): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.536076] team0 (unregistering): Port device team_slave_0 removed [ 1430.543154] kobject: 'rx-0' (000000003b7f720d): kobject_cleanup, parent 000000008e708478 [ 1430.551617] kobject: 'rx-0' (000000003b7f720d): auto cleanup 'remove' event [ 1430.558752] kobject: 'rx-0' (000000003b7f720d): kobject_uevent_env [ 1430.565066] kobject: 'rx-0' (000000003b7f720d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.575393] kobject: 'rx-0' (000000003b7f720d): auto cleanup kobject_del [ 1430.583054] kobject: 'rx-0' (000000003b7f720d): calling ktype release [ 1430.589672] kobject: 'rx-0': free name [ 1430.593599] kobject: 'tx-0' (00000000fcc56786): kobject_cleanup, parent 000000008e708478 [ 1430.602012] kobject: 'tx-0' (00000000fcc56786): auto cleanup 'remove' event [ 1430.609148] kobject: 'tx-0' (00000000fcc56786): kobject_uevent_env [ 1430.615485] kobject: 'tx-0' (00000000fcc56786): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.625571] kobject: 'tx-0' (00000000fcc56786): auto cleanup kobject_del [ 1430.632472] kobject: 'tx-0' (00000000fcc56786): calling ktype release [ 1430.639080] kobject: 'tx-0': free name [ 1430.643002] kobject: 'queues' (000000008e708478): kobject_cleanup, parent (null) [ 1430.651456] kobject: 'queues' (000000008e708478): calling ktype release [ 1430.658235] kobject: 'queues' (000000008e708478): kset_release [ 1430.664196] kobject: 'queues': free name [ 1430.668630] kobject: 'team_slave_0' (00000000477470f6): kobject_uevent_env [ 1430.675650] kobject: 'team_slave_0' (00000000477470f6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.688478] kobject: 'rx-0' (00000000e6968280): kobject_cleanup, parent 000000005ebea3f4 [ 1430.696707] kobject: 'rx-0' (00000000e6968280): auto cleanup 'remove' event [ 1430.703867] kobject: 'rx-0' (00000000e6968280): kobject_uevent_env [ 1430.710198] kobject: 'rx-0' (00000000e6968280): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.720278] kobject: 'rx-0' (00000000e6968280): auto cleanup kobject_del [ 1430.727151] kobject: 'rx-0' (00000000e6968280): calling ktype release [ 1430.733769] kobject: 'rx-0': free name [ 1430.737718] kobject: 'tx-0' (00000000048e7fef): kobject_cleanup, parent 000000005ebea3f4 [ 1430.746017] kobject: 'tx-0' (00000000048e7fef): auto cleanup 'remove' event [ 1430.753138] kobject: 'tx-0' (00000000048e7fef): kobject_uevent_env [ 1430.759474] kobject: 'tx-0' (00000000048e7fef): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.769566] kobject: 'tx-0' (00000000048e7fef): auto cleanup kobject_del [ 1430.776438] kobject: 'tx-0' (00000000048e7fef): calling ktype release [ 1430.783067] kobject: 'tx-0': free name [ 1430.786969] kobject: 'queues' (000000005ebea3f4): kobject_cleanup, parent (null) [ 1430.795391] kobject: 'queues' (000000005ebea3f4): calling ktype release [ 1430.802155] kobject: 'queues' (000000005ebea3f4): kset_release [ 1430.808463] kobject: 'queues': free name [ 1430.812781] kobject: 'veth0_to_team' (00000000ff6a4291): kobject_uevent_env [ 1430.819916] kobject: 'veth0_to_team' (00000000ff6a4291): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.831187] kobject: 'bonding_slave' (0000000064207dd7): kobject_cleanup, parent 00000000ce424733 [ 1430.840241] kobject: 'bonding_slave' (0000000064207dd7): does not have a release() function, it is broken and must be fixed. [ 1430.851618] kobject: 'bonding_slave' (0000000064207dd7): auto cleanup kobject_del [ 1430.859268] kobject: 'bonding_slave': free name [ 1430.864150] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1430.918252] kobject: 'rx-0' (000000001072536e): kobject_cleanup, parent 00000000c4d67e4e [ 1430.926501] kobject: 'rx-0' (000000001072536e): auto cleanup 'remove' event [ 1430.933654] kobject: 'rx-0' (000000001072536e): kobject_uevent_env [ 1430.940241] kobject: 'rx-0' (000000001072536e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.950327] kobject: 'rx-0' (000000001072536e): auto cleanup kobject_del [ 1430.957237] kobject: 'rx-0' (000000001072536e): calling ktype release [ 1430.964108] kobject: 'rx-0': free name [ 1430.968088] kobject: 'tx-0' (0000000010f8d87a): kobject_cleanup, parent 00000000c4d67e4e [ 1430.976312] kobject: 'tx-0' (0000000010f8d87a): auto cleanup 'remove' event [ 1430.983439] kobject: 'tx-0' (0000000010f8d87a): kobject_uevent_env [ 1430.989771] kobject: 'tx-0' (0000000010f8d87a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1430.999886] kobject: 'tx-0' (0000000010f8d87a): auto cleanup kobject_del [ 1431.006765] kobject: 'tx-0' (0000000010f8d87a): calling ktype release [ 1431.013370] kobject: 'tx-0': free name [ 1431.017279] kobject: 'queues' (00000000c4d67e4e): kobject_cleanup, parent (null) [ 1431.025748] kobject: 'queues' (00000000c4d67e4e): calling ktype release [ 1431.032520] kobject: 'queues' (00000000c4d67e4e): kset_release [ 1431.038532] kobject: 'queues': free name [ 1431.042887] kobject: 'bond_slave_1' (00000000ce424733): kobject_uevent_env [ 1431.049947] kobject: 'bond_slave_1' (00000000ce424733): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.062487] kobject: 'rx-0' (00000000d2d1062a): kobject_cleanup, parent 000000002d3c39e1 [ 1431.071111] kobject: 'rx-0' (00000000d2d1062a): auto cleanup 'remove' event [ 1431.078263] kobject: 'rx-0' (00000000d2d1062a): kobject_uevent_env [ 1431.084601] kobject: 'rx-0' (00000000d2d1062a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.094733] kobject: 'rx-0' (00000000d2d1062a): auto cleanup kobject_del [ 1431.101633] kobject: 'rx-0' (00000000d2d1062a): calling ktype release [ 1431.108233] kobject: 'rx-0': free name [ 1431.112165] kobject: 'tx-0' (00000000ba597e6d): kobject_cleanup, parent 000000002d3c39e1 [ 1431.120430] kobject: 'tx-0' (00000000ba597e6d): auto cleanup 'remove' event [ 1431.127559] kobject: 'tx-0' (00000000ba597e6d): kobject_uevent_env [ 1431.133866] kobject: 'tx-0' (00000000ba597e6d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.143967] kobject: 'tx-0' (00000000ba597e6d): auto cleanup kobject_del [ 1431.150865] kobject: 'tx-0' (00000000ba597e6d): calling ktype release [ 1431.157426] kobject: 'tx-0': free name [ 1431.161403] kobject: 'queues' (000000002d3c39e1): kobject_cleanup, parent (null) [ 1431.169841] kobject: 'queues' (000000002d3c39e1): calling ktype release [ 1431.176806] kobject: 'queues' (000000002d3c39e1): kset_release [ 1431.182841] kobject: 'queues': free name [ 1431.187180] kobject: 'veth1_to_bond' (00000000e3b1ab8f): kobject_uevent_env [ 1431.194332] kobject: 'veth1_to_bond' (00000000e3b1ab8f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.205762] kobject: 'bonding_slave' (0000000091410fbc): kobject_cleanup, parent 000000008ea58583 [ 1431.214844] kobject: 'bonding_slave' (0000000091410fbc): does not have a release() function, it is broken and must be fixed. [ 1431.226436] kobject: 'bonding_slave' (0000000091410fbc): auto cleanup kobject_del [ 1431.234101] kobject: 'bonding_slave': free name [ 1431.239024] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1431.278446] kobject: 'rx-0' (000000002677e1eb): kobject_cleanup, parent 000000000a037953 [ 1431.286695] kobject: 'rx-0' (000000002677e1eb): auto cleanup 'remove' event [ 1431.293928] kobject: 'rx-0' (000000002677e1eb): kobject_uevent_env [ 1431.300276] kobject: 'rx-0' (000000002677e1eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.310458] kobject: 'rx-0' (000000002677e1eb): auto cleanup kobject_del [ 1431.317327] kobject: 'rx-0' (000000002677e1eb): calling ktype release [ 1431.323937] kobject: 'rx-0': free name [ 1431.327911] kobject: 'tx-0' (0000000072940449): kobject_cleanup, parent 000000000a037953 [ 1431.336152] kobject: 'tx-0' (0000000072940449): auto cleanup 'remove' event [ 1431.343563] kobject: 'tx-0' (0000000072940449): kobject_uevent_env [ 1431.349917] kobject: 'tx-0' (0000000072940449): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.360007] kobject: 'tx-0' (0000000072940449): auto cleanup kobject_del [ 1431.366886] kobject: 'tx-0' (0000000072940449): calling ktype release [ 1431.373545] kobject: 'tx-0': free name [ 1431.377455] kobject: 'queues' (000000000a037953): kobject_cleanup, parent (null) [ 1431.385903] kobject: 'queues' (000000000a037953): calling ktype release [ 1431.392679] kobject: 'queues' (000000000a037953): kset_release [ 1431.398715] kobject: 'queues': free name [ 1431.403054] kobject: 'bond_slave_0' (000000008ea58583): kobject_uevent_env [ 1431.410129] kobject: 'bond_slave_0' (000000008ea58583): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.422568] kobject: 'rx-0' (0000000028348c1f): kobject_cleanup, parent 00000000e6c9e083 [ 1431.430855] kobject: 'rx-0' (0000000028348c1f): auto cleanup 'remove' event [ 1431.437977] kobject: 'rx-0' (0000000028348c1f): kobject_uevent_env [ 1431.444279] kobject: 'rx-0' (0000000028348c1f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.454375] kobject: 'rx-0' (0000000028348c1f): auto cleanup kobject_del [ 1431.461350] kobject: 'rx-0' (0000000028348c1f): calling ktype release [ 1431.467980] kobject: 'rx-0': free name [ 1431.471893] kobject: 'tx-0' (000000001a643f09): kobject_cleanup, parent 00000000e6c9e083 [ 1431.480189] kobject: 'tx-0' (000000001a643f09): auto cleanup 'remove' event [ 1431.487287] kobject: 'tx-0' (000000001a643f09): kobject_uevent_env [ 1431.493654] kobject: 'tx-0' (000000001a643f09): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.503720] kobject: 'tx-0' (000000001a643f09): auto cleanup kobject_del [ 1431.510633] kobject: 'tx-0' (000000001a643f09): calling ktype release [ 1431.517206] kobject: 'tx-0': free name [ 1431.521145] kobject: 'queues' (00000000e6c9e083): kobject_cleanup, parent (null) [ 1431.529573] kobject: 'queues' (00000000e6c9e083): calling ktype release [ 1431.536309] kobject: 'queues' (00000000e6c9e083): kset_release [ 1431.542454] kobject: 'queues': free name [ 1431.546767] kobject: 'veth0_to_bond' (000000001c163fef): kobject_uevent_env [ 1431.553922] kobject: 'veth0_to_bond' (000000001c163fef): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.565638] kobject: 'rx-0' (000000001a8d97eb): kobject_cleanup, parent 000000003f224a73 [ 1431.573901] kobject: 'rx-0' (000000001a8d97eb): auto cleanup 'remove' event [ 1431.581011] kobject: 'rx-0' (000000001a8d97eb): kobject_uevent_env [ 1431.587306] kobject: 'rx-0' (000000001a8d97eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.597370] kobject: 'rx-0' (000000001a8d97eb): auto cleanup kobject_del [ 1431.604252] kobject: 'rx-0' (000000001a8d97eb): calling ktype release [ 1431.610856] kobject: 'rx-0': free name [ 1431.614771] kobject: 'tx-0' (000000001f993d9d): kobject_cleanup, parent 000000003f224a73 [ 1431.623013] kobject: 'tx-0' (000000001f993d9d): auto cleanup 'remove' event [ 1431.630138] kobject: 'tx-0' (000000001f993d9d): kobject_uevent_env [ 1431.636438] kobject: 'tx-0' (000000001f993d9d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.646508] kobject: 'tx-0' (000000001f993d9d): auto cleanup kobject_del [ 1431.653396] kobject: 'tx-0' (000000001f993d9d): calling ktype release [ 1431.659999] kobject: 'tx-0': free name [ 1431.663895] kobject: 'queues' (000000003f224a73): kobject_cleanup, parent (null) [ 1431.672314] kobject: 'queues' (000000003f224a73): calling ktype release [ 1431.679096] kobject: 'queues' (000000003f224a73): kset_release [ 1431.685053] kobject: 'queues': free name [ 1431.689537] kobject: 'bridge_slave_1' (00000000e70f2edd): kobject_uevent_env [ 1431.696729] kobject: 'bridge_slave_1' (00000000e70f2edd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.709427] kobject: 'rx-0' (00000000456ff357): kobject_cleanup, parent 000000001af1ad4a [ 1431.717683] kobject: 'rx-0' (00000000456ff357): auto cleanup 'remove' event [ 1431.724777] kobject: 'rx-0' (00000000456ff357): kobject_uevent_env [ 1431.731110] kobject: 'rx-0' (00000000456ff357): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.741176] kobject: 'rx-0' (00000000456ff357): auto cleanup kobject_del [ 1431.748058] kobject: 'rx-0' (00000000456ff357): calling ktype release [ 1431.754633] kobject: 'rx-0': free name [ 1431.758593] kobject: 'tx-0' (000000005dc29ed1): kobject_cleanup, parent 000000001af1ad4a [ 1431.766842] kobject: 'tx-0' (000000005dc29ed1): auto cleanup 'remove' event [ 1431.773960] kobject: 'tx-0' (000000005dc29ed1): kobject_uevent_env [ 1431.780291] kobject: 'tx-0' (000000005dc29ed1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.790365] kobject: 'tx-0' (000000005dc29ed1): auto cleanup kobject_del [ 1431.797229] kobject: 'tx-0' (000000005dc29ed1): calling ktype release [ 1431.803818] kobject: 'tx-0': free name [ 1431.807757] kobject: 'queues' (000000001af1ad4a): kobject_cleanup, parent (null) [ 1431.816142] kobject: 'queues' (000000001af1ad4a): calling ktype release [ 1431.822934] kobject: 'queues' (000000001af1ad4a): kset_release [ 1431.829075] kobject: 'queues': free name [ 1431.833375] kobject: 'veth1_to_bridge' (0000000061358113): kobject_uevent_env [ 1431.840685] kobject: 'veth1_to_bridge' (0000000061358113): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.852375] kobject: 'rx-0' (000000006da20ea9): kobject_cleanup, parent 00000000f463e0c9 [ 1431.860630] kobject: 'rx-0' (000000006da20ea9): auto cleanup 'remove' event [ 1431.867745] kobject: 'rx-0' (000000006da20ea9): kobject_uevent_env [ 1431.874042] kobject: 'rx-0' (000000006da20ea9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.884105] kobject: 'rx-0' (000000006da20ea9): auto cleanup kobject_del [ 1431.890976] kobject: 'rx-0' (000000006da20ea9): calling ktype release [ 1431.897568] kobject: 'rx-0': free name [ 1431.901474] kobject: 'tx-0' (00000000b91ab411): kobject_cleanup, parent 00000000f463e0c9 [ 1431.909716] kobject: 'tx-0' (00000000b91ab411): auto cleanup 'remove' event [ 1431.916817] kobject: 'tx-0' (00000000b91ab411): kobject_uevent_env [ 1431.923163] kobject: 'tx-0' (00000000b91ab411): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.933234] kobject: 'tx-0' (00000000b91ab411): auto cleanup kobject_del [ 1431.940133] kobject: 'tx-0' (00000000b91ab411): calling ktype release [ 1431.946706] kobject: 'tx-0': free name [ 1431.950629] kobject: 'queues' (00000000f463e0c9): kobject_cleanup, parent (null) [ 1431.959067] kobject: 'queues' (00000000f463e0c9): calling ktype release [ 1431.965813] kobject: 'queues' (00000000f463e0c9): kset_release [ 1431.972093] kobject: 'queues': free name [ 1431.976384] kobject: 'bridge_slave_0' (000000004dbbf594): kobject_uevent_env [ 1431.983589] kobject: 'bridge_slave_0' (000000004dbbf594): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1431.996180] kobject: 'rx-0' (0000000029f5f474): kobject_cleanup, parent 0000000066dd01ac [ 1432.004444] kobject: 'rx-0' (0000000029f5f474): auto cleanup 'remove' event [ 1432.011566] kobject: 'rx-0' (0000000029f5f474): kobject_uevent_env [ 1432.017951] kobject: 'rx-0' (0000000029f5f474): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.028041] kobject: 'rx-0' (0000000029f5f474): auto cleanup kobject_del [ 1432.034893] kobject: 'rx-0' (0000000029f5f474): calling ktype release [ 1432.041756] kobject: 'rx-0': free name [ 1432.045663] kobject: 'tx-0' (00000000099f2571): kobject_cleanup, parent 0000000066dd01ac [ 1432.053916] kobject: 'tx-0' (00000000099f2571): auto cleanup 'remove' event [ 1432.061066] kobject: 'tx-0' (00000000099f2571): kobject_uevent_env [ 1432.067366] kobject: 'tx-0' (00000000099f2571): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.077459] kobject: 'tx-0' (00000000099f2571): auto cleanup kobject_del [ 1432.084356] kobject: 'tx-0' (00000000099f2571): calling ktype release [ 1432.090947] kobject: 'tx-0': free name [ 1432.094856] kobject: 'queues' (0000000066dd01ac): kobject_cleanup, parent (null) [ 1432.103348] kobject: 'queues' (0000000066dd01ac): calling ktype release [ 1432.110140] kobject: 'queues' (0000000066dd01ac): kset_release [ 1432.116114] kobject: 'queues': free name [ 1432.120813] kobject: 'veth0_to_bridge' (0000000027ccf8ff): kobject_uevent_env [ 1432.128132] kobject: 'veth0_to_bridge' (0000000027ccf8ff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.140788] kobject: 'rx-0' (000000008c8d4bfa): kobject_cleanup, parent 0000000096b0bee3 [ 1432.149046] kobject: 'rx-0' (000000008c8d4bfa): auto cleanup 'remove' event [ 1432.156140] kobject: 'rx-0' (000000008c8d4bfa): kobject_uevent_env [ 1432.162485] kobject: 'rx-0' (000000008c8d4bfa): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.172549] kobject: 'rx-0' (000000008c8d4bfa): auto cleanup kobject_del [ 1432.179548] kobject: 'rx-0' (000000008c8d4bfa): calling ktype release [ 1432.186126] kobject: 'rx-0': free name [ 1432.190090] kobject: 'tx-0' (00000000e70e6050): kobject_cleanup, parent 0000000096b0bee3 [ 1432.198362] kobject: 'tx-0' (00000000e70e6050): auto cleanup 'remove' event [ 1432.205446] kobject: 'tx-0' (00000000e70e6050): kobject_uevent_env [ 1432.211775] kobject: 'tx-0' (00000000e70e6050): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.221970] kobject: 'tx-0' (00000000e70e6050): auto cleanup kobject_del [ 1432.228909] kobject: 'tx-0' (00000000e70e6050): calling ktype release [ 1432.235488] kobject: 'tx-0': free name [ 1432.239769] kobject: 'queues' (0000000096b0bee3): kobject_cleanup, parent (null) [ 1432.248202] kobject: 'queues' (0000000096b0bee3): calling ktype release [ 1432.255010] kobject: 'queues' (0000000096b0bee3): kset_release [ 1432.261006] kobject: 'queues': free name [ 1432.265343] kobject: 'veth1' (00000000df7bef0f): kobject_uevent_env [ 1432.271779] kobject: 'veth1' (00000000df7bef0f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.283541] kobject: 'rx-0' (00000000da9858e5): kobject_cleanup, parent 00000000aee48f9d [ 1432.291800] kobject: 'rx-0' (00000000da9858e5): auto cleanup 'remove' event [ 1432.298923] kobject: 'rx-0' (00000000da9858e5): kobject_uevent_env [ 1432.305224] kobject: 'rx-0' (00000000da9858e5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.315310] kobject: 'rx-0' (00000000da9858e5): auto cleanup kobject_del [ 1432.322189] kobject: 'rx-0' (00000000da9858e5): calling ktype release [ 1432.328783] kobject: 'rx-0': free name [ 1432.332700] kobject: 'tx-0' (0000000099c6499d): kobject_cleanup, parent 00000000aee48f9d [ 1432.345702] kobject: 'tx-0' (0000000099c6499d): auto cleanup 'remove' event [ 1432.352869] kobject: 'tx-0' (0000000099c6499d): kobject_uevent_env [ 1432.359288] kobject: 'tx-0' (0000000099c6499d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.369360] kobject: 'tx-0' (0000000099c6499d): auto cleanup kobject_del [ 1432.376245] kobject: 'tx-0' (0000000099c6499d): calling ktype release [ 1432.382856] kobject: 'tx-0': free name [ 1432.386750] kobject: 'queues' (00000000aee48f9d): kobject_cleanup, parent (null) [ 1432.395173] kobject: 'queues' (00000000aee48f9d): calling ktype release [ 1432.401939] kobject: 'queues' (00000000aee48f9d): kset_release [ 1432.407958] kobject: 'queues': free name [ 1432.412310] kobject: 'veth0' (0000000044ee2b6b): kobject_uevent_env [ 1432.418789] kobject: 'veth0' (0000000044ee2b6b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.430797] kobject: 'rx-15' (0000000085108746): kobject_cleanup, parent 00000000bcb1a650 [ 1432.439465] kobject: 'rx-15' (0000000085108746): auto cleanup 'remove' event [ 1432.446637] kobject: 'rx-15' (0000000085108746): kobject_uevent_env [ 1432.453063] kobject: 'rx-15' (0000000085108746): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.463219] kobject: 'rx-15' (0000000085108746): auto cleanup kobject_del [ 1432.470211] kobject: 'rx-15' (0000000085108746): calling ktype release [ 1432.476872] kobject: 'rx-15': free name [ 1432.480904] kobject: 'rx-14' (000000004e8a30b2): kobject_cleanup, parent 00000000bcb1a650 [ 1432.489252] kobject: 'rx-14' (000000004e8a30b2): auto cleanup 'remove' event [ 1432.496424] kobject: 'rx-14' (000000004e8a30b2): kobject_uevent_env [ 1432.503796] kobject: 'rx-14' (000000004e8a30b2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.513991] kobject: 'rx-14' (000000004e8a30b2): auto cleanup kobject_del [ 1432.521086] kobject: 'rx-14' (000000004e8a30b2): calling ktype release [ 1432.527766] kobject: 'rx-14': free name [ 1432.531739] kobject: 'rx-13' (0000000059fb1cf4): kobject_cleanup, parent 00000000bcb1a650 [ 1432.540074] kobject: 'rx-13' (0000000059fb1cf4): auto cleanup 'remove' event [ 1432.547260] kobject: 'rx-13' (0000000059fb1cf4): kobject_uevent_env [ 1432.553681] kobject: 'rx-13' (0000000059fb1cf4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.563839] kobject: 'rx-13' (0000000059fb1cf4): auto cleanup kobject_del [ 1432.570819] kobject: 'rx-13' (0000000059fb1cf4): calling ktype release [ 1432.577567] kobject: 'rx-13': free name [ 1432.581549] kobject: 'rx-12' (00000000cafc449e): kobject_cleanup, parent 00000000bcb1a650 [ 1432.589902] kobject: 'rx-12' (00000000cafc449e): auto cleanup 'remove' event [ 1432.597081] kobject: 'rx-12' (00000000cafc449e): kobject_uevent_env [ 1432.604011] kobject: 'rx-12' (00000000cafc449e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.614178] kobject: 'rx-12' (00000000cafc449e): auto cleanup kobject_del [ 1432.621144] kobject: 'rx-12' (00000000cafc449e): calling ktype release [ 1432.627823] kobject: 'rx-12': free name [ 1432.631807] kobject: 'rx-11' (000000006b69548a): kobject_cleanup, parent 00000000bcb1a650 [ 1432.640145] kobject: 'rx-11' (000000006b69548a): auto cleanup 'remove' event [ 1432.647327] kobject: 'rx-11' (000000006b69548a): kobject_uevent_env [ 1432.653745] kobject: 'rx-11' (000000006b69548a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.663904] kobject: 'rx-11' (000000006b69548a): auto cleanup kobject_del [ 1432.670892] kobject: 'rx-11' (000000006b69548a): calling ktype release [ 1432.677583] kobject: 'rx-11': free name [ 1432.681555] kobject: 'rx-10' (00000000e91a541c): kobject_cleanup, parent 00000000bcb1a650 [ 1432.689885] kobject: 'rx-10' (00000000e91a541c): auto cleanup 'remove' event [ 1432.697065] kobject: 'rx-10' (00000000e91a541c): kobject_uevent_env [ 1432.703490] kobject: 'rx-10' (00000000e91a541c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.713666] kobject: 'rx-10' (00000000e91a541c): auto cleanup kobject_del [ 1432.720642] kobject: 'rx-10' (00000000e91a541c): calling ktype release [ 1432.727301] kobject: 'rx-10': free name [ 1432.731314] kobject: 'rx-9' (0000000022e9093e): kobject_cleanup, parent 00000000bcb1a650 [ 1432.739762] kobject: 'rx-9' (0000000022e9093e): auto cleanup 'remove' event [ 1432.746847] kobject: 'rx-9' (0000000022e9093e): kobject_uevent_env [ 1432.753179] kobject: 'rx-9' (0000000022e9093e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.763242] kobject: 'rx-9' (0000000022e9093e): auto cleanup kobject_del [ 1432.770123] kobject: 'rx-9' (0000000022e9093e): calling ktype release [ 1432.776706] kobject: 'rx-9': free name [ 1432.780620] kobject: 'rx-8' (00000000474885d1): kobject_cleanup, parent 00000000bcb1a650 [ 1432.788894] kobject: 'rx-8' (00000000474885d1): auto cleanup 'remove' event [ 1432.795975] kobject: 'rx-8' (00000000474885d1): kobject_uevent_env [ 1432.802303] kobject: 'rx-8' (00000000474885d1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.812382] kobject: 'rx-8' (00000000474885d1): auto cleanup kobject_del [ 1432.819287] kobject: 'rx-8' (00000000474885d1): calling ktype release [ 1432.825865] kobject: 'rx-8': free name [ 1432.829795] kobject: 'rx-7' (000000007f8894e3): kobject_cleanup, parent 00000000bcb1a650 [ 1432.838045] kobject: 'rx-7' (000000007f8894e3): auto cleanup 'remove' event [ 1432.845137] kobject: 'rx-7' (000000007f8894e3): kobject_uevent_env [ 1432.851469] kobject: 'rx-7' (000000007f8894e3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.861534] kobject: 'rx-7' (000000007f8894e3): auto cleanup kobject_del [ 1432.868429] kobject: 'rx-7' (000000007f8894e3): calling ktype release [ 1432.875013] kobject: 'rx-7': free name [ 1432.878924] kobject: 'rx-6' (000000001542ce88): kobject_cleanup, parent 00000000bcb1a650 [ 1432.887158] kobject: 'rx-6' (000000001542ce88): auto cleanup 'remove' event [ 1432.894274] kobject: 'rx-6' (000000001542ce88): kobject_uevent_env [ 1432.900613] kobject: 'rx-6' (000000001542ce88): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.910678] kobject: 'rx-6' (000000001542ce88): auto cleanup kobject_del [ 1432.917549] kobject: 'rx-6' (000000001542ce88): calling ktype release [ 1432.924108] kobject: 'rx-6': free name [ 1432.928011] kobject: 'rx-5' (0000000013b9555c): kobject_cleanup, parent 00000000bcb1a650 [ 1432.936232] kobject: 'rx-5' (0000000013b9555c): auto cleanup 'remove' event [ 1432.943345] kobject: 'rx-5' (0000000013b9555c): kobject_uevent_env [ 1432.949677] kobject: 'rx-5' (0000000013b9555c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1432.959754] kobject: 'rx-5' (0000000013b9555c): auto cleanup kobject_del [ 1432.966607] kobject: 'rx-5' (0000000013b9555c): calling ktype release [ 1432.973198] kobject: 'rx-5': free name [ 1432.977084] kobject: 'rx-4' (000000005b1c01cb): kobject_cleanup, parent 00000000bcb1a650 [ 1432.985539] kobject: 'rx-4' (000000005b1c01cb): auto cleanup 'remove' event [ 1432.992679] kobject: 'rx-4' (000000005b1c01cb): kobject_uevent_env [ 1432.999011] kobject: 'rx-4' (000000005b1c01cb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.009074] kobject: 'rx-4' (000000005b1c01cb): auto cleanup kobject_del [ 1433.015953] kobject: 'rx-4' (000000005b1c01cb): calling ktype release [ 1433.022569] kobject: 'rx-4': free name [ 1433.026458] kobject: 'rx-3' (000000003d848af7): kobject_cleanup, parent 00000000bcb1a650 [ 1433.034717] kobject: 'rx-3' (000000003d848af7): auto cleanup 'remove' event [ 1433.041859] kobject: 'rx-3' (000000003d848af7): kobject_uevent_env [ 1433.048371] kobject: 'rx-3' (000000003d848af7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.058491] kobject: 'rx-3' (000000003d848af7): auto cleanup kobject_del [ 1433.065336] kobject: 'rx-3' (000000003d848af7): calling ktype release [ 1433.071949] kobject: 'rx-3': free name [ 1433.075847] kobject: 'rx-2' (0000000027a66f21): kobject_cleanup, parent 00000000bcb1a650 [ 1433.084138] kobject: 'rx-2' (0000000027a66f21): auto cleanup 'remove' event [ 1433.091263] kobject: 'rx-2' (0000000027a66f21): kobject_uevent_env [ 1433.097599] kobject: 'rx-2' (0000000027a66f21): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.107662] kobject: 'rx-2' (0000000027a66f21): auto cleanup kobject_del [ 1433.114506] kobject: 'rx-2' (0000000027a66f21): calling ktype release [ 1433.121102] kobject: 'rx-2': free name [ 1433.124987] kobject: 'rx-1' (000000002440e30e): kobject_cleanup, parent 00000000bcb1a650 [ 1433.133230] kobject: 'rx-1' (000000002440e30e): auto cleanup 'remove' event [ 1433.140341] kobject: 'rx-1' (000000002440e30e): kobject_uevent_env [ 1433.146640] kobject: 'rx-1' (000000002440e30e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.156709] kobject: 'rx-1' (000000002440e30e): auto cleanup kobject_del [ 1433.163606] kobject: 'rx-1' (000000002440e30e): calling ktype release [ 1433.170196] kobject: 'rx-1': free name [ 1433.174236] kobject: 'rx-0' (00000000e87ddb52): kobject_cleanup, parent 00000000bcb1a650 [ 1433.182481] kobject: 'rx-0' (00000000e87ddb52): auto cleanup 'remove' event [ 1433.189595] kobject: 'rx-0' (00000000e87ddb52): kobject_uevent_env [ 1433.195897] kobject: 'rx-0' (00000000e87ddb52): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.205984] kobject: 'rx-0' (00000000e87ddb52): auto cleanup kobject_del [ 1433.212876] kobject: 'rx-0' (00000000e87ddb52): calling ktype release [ 1433.219573] kobject: 'rx-0': free name [ 1433.223510] kobject: 'tx-15' (000000006fac5946): kobject_cleanup, parent 00000000bcb1a650 [ 1433.231856] kobject: 'tx-15' (000000006fac5946): auto cleanup 'remove' event [ 1433.239066] kobject: 'tx-15' (000000006fac5946): kobject_uevent_env [ 1433.245469] kobject: 'tx-15' (000000006fac5946): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.255671] kobject: 'tx-15' (000000006fac5946): auto cleanup kobject_del [ 1433.262644] kobject: 'tx-15' (000000006fac5946): calling ktype release [ 1433.269327] kobject: 'tx-15': free name [ 1433.273366] kobject: 'tx-14' (000000006369a41a): kobject_cleanup, parent 00000000bcb1a650 [ 1433.281728] kobject: 'tx-14' (000000006369a41a): auto cleanup 'remove' event [ 1433.288948] kobject: 'tx-14' (000000006369a41a): kobject_uevent_env [ 1433.295335] kobject: 'tx-14' (000000006369a41a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.305682] kobject: 'tx-14' (000000006369a41a): auto cleanup kobject_del [ 1433.312656] kobject: 'tx-14' (000000006369a41a): calling ktype release [ 1433.319333] kobject: 'tx-14': free name [ 1433.323336] kobject: 'tx-13' (000000001fceeea0): kobject_cleanup, parent 00000000bcb1a650 [ 1433.331686] kobject: 'tx-13' (000000001fceeea0): auto cleanup 'remove' event [ 1433.338887] kobject: 'tx-13' (000000001fceeea0): kobject_uevent_env [ 1433.345286] kobject: 'tx-13' (000000001fceeea0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.355455] kobject: 'tx-13' (000000001fceeea0): auto cleanup kobject_del [ 1433.362428] kobject: 'tx-13' (000000001fceeea0): calling ktype release [ 1433.369121] kobject: 'tx-13': free name [ 1433.373120] kobject: 'tx-12' (000000003ee3a116): kobject_cleanup, parent 00000000bcb1a650 [ 1433.381453] kobject: 'tx-12' (000000003ee3a116): auto cleanup 'remove' event [ 1433.388661] kobject: 'tx-12' (000000003ee3a116): kobject_uevent_env [ 1433.395045] kobject: 'tx-12' (000000003ee3a116): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.405193] kobject: 'tx-12' (000000003ee3a116): auto cleanup kobject_del [ 1433.412183] kobject: 'tx-12' (000000003ee3a116): calling ktype release [ 1433.418934] kobject: 'tx-12': free name [ 1433.422935] kobject: 'tx-11' (00000000356cf39d): kobject_cleanup, parent 00000000bcb1a650 [ 1433.431302] kobject: 'tx-11' (00000000356cf39d): auto cleanup 'remove' event [ 1433.438519] kobject: 'tx-11' (00000000356cf39d): kobject_uevent_env [ 1433.444904] kobject: 'tx-11' (00000000356cf39d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.455060] kobject: 'tx-11' (00000000356cf39d): auto cleanup kobject_del [ 1433.462079] kobject: 'tx-11' (00000000356cf39d): calling ktype release [ 1433.468805] kobject: 'tx-11': free name [ 1433.472809] kobject: 'tx-10' (0000000018eb9fd6): kobject_cleanup, parent 00000000bcb1a650 [ 1433.481153] kobject: 'tx-10' (0000000018eb9fd6): auto cleanup 'remove' event [ 1433.488353] kobject: 'tx-10' (0000000018eb9fd6): kobject_uevent_env [ 1433.494746] kobject: 'tx-10' (0000000018eb9fd6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.504902] kobject: 'tx-10' (0000000018eb9fd6): auto cleanup kobject_del [ 1433.511871] kobject: 'tx-10' (0000000018eb9fd6): calling ktype release [ 1433.518550] kobject: 'tx-10': free name [ 1433.522571] kobject: 'tx-9' (000000005f3919f6): kobject_cleanup, parent 00000000bcb1a650 [ 1433.530841] kobject: 'tx-9' (000000005f3919f6): auto cleanup 'remove' event [ 1433.538025] kobject: 'tx-9' (000000005f3919f6): kobject_uevent_env [ 1433.544329] kobject: 'tx-9' (000000005f3919f6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.554410] kobject: 'tx-9' (000000005f3919f6): auto cleanup kobject_del [ 1433.561326] kobject: 'tx-9' (000000005f3919f6): calling ktype release [ 1433.567926] kobject: 'tx-9': free name [ 1433.571842] kobject: 'tx-8' (00000000bbdde15f): kobject_cleanup, parent 00000000bcb1a650 [ 1433.580099] kobject: 'tx-8' (00000000bbdde15f): auto cleanup 'remove' event [ 1433.587217] kobject: 'tx-8' (00000000bbdde15f): kobject_uevent_env [ 1433.593551] kobject: 'tx-8' (00000000bbdde15f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.603619] kobject: 'tx-8' (00000000bbdde15f): auto cleanup kobject_del [ 1433.610533] kobject: 'tx-8' (00000000bbdde15f): calling ktype release [ 1433.617105] kobject: 'tx-8': free name [ 1433.621078] kobject: 'tx-7' (000000000bacfdb7): kobject_cleanup, parent 00000000bcb1a650 [ 1433.629325] kobject: 'tx-7' (000000000bacfdb7): auto cleanup 'remove' event [ 1433.636405] kobject: 'tx-7' (000000000bacfdb7): kobject_uevent_env [ 1433.642747] kobject: 'tx-7' (000000000bacfdb7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.652837] kobject: 'tx-7' (000000000bacfdb7): auto cleanup kobject_del [ 1433.659748] kobject: 'tx-7' (000000000bacfdb7): calling ktype release [ 1433.666335] kobject: 'tx-7': free name [ 1433.670295] kobject: 'tx-6' (0000000099eda926): kobject_cleanup, parent 00000000bcb1a650 [ 1433.678559] kobject: 'tx-6' (0000000099eda926): auto cleanup 'remove' event [ 1433.685638] kobject: 'tx-6' (0000000099eda926): kobject_uevent_env [ 1433.691989] kobject: 'tx-6' (0000000099eda926): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.702095] kobject: 'tx-6' (0000000099eda926): auto cleanup kobject_del [ 1433.709000] kobject: 'tx-6' (0000000099eda926): calling ktype release [ 1433.715572] kobject: 'tx-6': free name [ 1433.719531] kobject: 'tx-5' (0000000046126659): kobject_cleanup, parent 00000000bcb1a650 [ 1433.727777] kobject: 'tx-5' (0000000046126659): auto cleanup 'remove' event [ 1433.734862] kobject: 'tx-5' (0000000046126659): kobject_uevent_env [ 1433.741224] kobject: 'tx-5' (0000000046126659): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.751293] kobject: 'tx-5' (0000000046126659): auto cleanup kobject_del [ 1433.758206] kobject: 'tx-5' (0000000046126659): calling ktype release [ 1433.764793] kobject: 'tx-5': free name [ 1433.768772] kobject: 'tx-4' (00000000e571d5e7): kobject_cleanup, parent 00000000bcb1a650 [ 1433.776999] kobject: 'tx-4' (00000000e571d5e7): auto cleanup 'remove' event [ 1433.784144] kobject: 'tx-4' (00000000e571d5e7): kobject_uevent_env [ 1433.790475] kobject: 'tx-4' (00000000e571d5e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.800539] kobject: 'tx-4' (00000000e571d5e7): auto cleanup kobject_del [ 1433.807413] kobject: 'tx-4' (00000000e571d5e7): calling ktype release [ 1433.814015] kobject: 'tx-4': free name [ 1433.817951] kobject: 'tx-3' (00000000d3a2ec16): kobject_cleanup, parent 00000000bcb1a650 [ 1433.826161] kobject: 'tx-3' (00000000d3a2ec16): auto cleanup 'remove' event [ 1433.833283] kobject: 'tx-3' (00000000d3a2ec16): kobject_uevent_env [ 1433.839629] kobject: 'tx-3' (00000000d3a2ec16): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.849697] kobject: 'tx-3' (00000000d3a2ec16): auto cleanup kobject_del [ 1433.856564] kobject: 'tx-3' (00000000d3a2ec16): calling ktype release [ 1433.863177] kobject: 'tx-3': free name [ 1433.867092] kobject: 'tx-2' (000000003a58fee4): kobject_cleanup, parent 00000000bcb1a650 [ 1433.875346] kobject: 'tx-2' (000000003a58fee4): auto cleanup 'remove' event [ 1433.882462] kobject: 'tx-2' (000000003a58fee4): kobject_uevent_env [ 1433.888818] kobject: 'tx-2' (000000003a58fee4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.898890] kobject: 'tx-2' (000000003a58fee4): auto cleanup kobject_del [ 1433.905751] kobject: 'tx-2' (000000003a58fee4): calling ktype release [ 1433.912349] kobject: 'tx-2': free name [ 1433.916258] kobject: 'tx-1' (00000000ae21db18): kobject_cleanup, parent 00000000bcb1a650 [ 1433.924519] kobject: 'tx-1' (00000000ae21db18): auto cleanup 'remove' event [ 1433.931660] kobject: 'tx-1' (00000000ae21db18): kobject_uevent_env [ 1433.937995] kobject: 'tx-1' (00000000ae21db18): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.948100] kobject: 'tx-1' (00000000ae21db18): auto cleanup kobject_del [ 1433.954972] kobject: 'tx-1' (00000000ae21db18): calling ktype release [ 1433.961571] kobject: 'tx-1': free name [ 1433.965489] kobject: 'tx-0' (00000000f16fa88c): kobject_cleanup, parent 00000000bcb1a650 [ 1433.973746] kobject: 'tx-0' (00000000f16fa88c): auto cleanup 'remove' event [ 1433.980867] kobject: 'tx-0' (00000000f16fa88c): kobject_uevent_env [ 1433.987167] kobject: 'tx-0' (00000000f16fa88c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1433.997288] kobject: 'tx-0' (00000000f16fa88c): auto cleanup kobject_del [ 1434.004228] kobject: 'tx-0' (00000000f16fa88c): calling ktype release [ 1434.010860] kobject: 'tx-0': free name [ 1434.014814] kobject: 'queues' (00000000bcb1a650): kobject_cleanup, parent (null) [ 1434.023333] kobject: 'queues' (00000000bcb1a650): calling ktype release [ 1434.030160] kobject: 'queues' (00000000bcb1a650): kset_release [ 1434.036169] kobject: 'queues': free name [ 1434.040859] kobject: 'team0' (00000000758d6202): kobject_uevent_env [ 1434.047612] kobject: 'team0' (00000000758d6202): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.060159] bond0 (unregistering): Released all slaves [ 1434.065476] kobject: 'rx-15' (00000000c34480bd): kobject_cleanup, parent 0000000023c45d06 [ 1434.073918] kobject: 'rx-15' (00000000c34480bd): auto cleanup 'remove' event [ 1434.081179] kobject: 'rx-15' (00000000c34480bd): kobject_uevent_env [ 1434.087644] kobject: 'rx-15' (00000000c34480bd): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.097976] kobject: 'rx-15' (00000000c34480bd): auto cleanup kobject_del [ 1434.104956] kobject: 'rx-15' (00000000c34480bd): calling ktype release [ 1434.111677] kobject: 'rx-15': free name [ 1434.115671] kobject: 'rx-14' (00000000d54b13b5): kobject_cleanup, parent 0000000023c45d06 [ 1434.124385] kobject: 'rx-14' (00000000d54b13b5): auto cleanup 'remove' event [ 1434.131673] kobject: 'rx-14' (00000000d54b13b5): kobject_uevent_env [ 1434.138193] kobject: 'rx-14' (00000000d54b13b5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.148439] kobject: 'rx-14' (00000000d54b13b5): auto cleanup kobject_del [ 1434.155495] kobject: 'rx-14' (00000000d54b13b5): calling ktype release [ 1434.162386] kobject: 'rx-14': free name [ 1434.166442] kobject: 'rx-13' (000000006d511fc6): kobject_cleanup, parent 0000000023c45d06 [ 1434.174935] kobject: 'rx-13' (000000006d511fc6): auto cleanup 'remove' event [ 1434.182174] kobject: 'rx-13' (000000006d511fc6): kobject_uevent_env [ 1434.188659] kobject: 'rx-13' (000000006d511fc6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.198893] kobject: 'rx-13' (000000006d511fc6): auto cleanup kobject_del [ 1434.205884] kobject: 'rx-13' (000000006d511fc6): calling ktype release [ 1434.212616] kobject: 'rx-13': free name [ 1434.216605] kobject: 'rx-12' (000000002d3d7f66): kobject_cleanup, parent 0000000023c45d06 [ 1434.224993] kobject: 'rx-12' (000000002d3d7f66): auto cleanup 'remove' event [ 1434.232219] kobject: 'rx-12' (000000002d3d7f66): kobject_uevent_env [ 1434.238739] kobject: 'rx-12' (000000002d3d7f66): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.249005] kobject: 'rx-12' (000000002d3d7f66): auto cleanup kobject_del [ 1434.256073] kobject: 'rx-12' (000000002d3d7f66): calling ktype release [ 1434.263719] kobject: 'rx-12': free name [ 1434.267785] kobject: 'rx-11' (0000000060b1e277): kobject_cleanup, parent 0000000023c45d06 [ 1434.276141] kobject: 'rx-11' (0000000060b1e277): auto cleanup 'remove' event [ 1434.283497] kobject: 'rx-11' (0000000060b1e277): kobject_uevent_env [ 1434.290012] kobject: 'rx-11' (0000000060b1e277): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.300397] kobject: 'rx-11' (0000000060b1e277): auto cleanup kobject_del [ 1434.307466] kobject: 'rx-11' (0000000060b1e277): calling ktype release [ 1434.314292] kobject: 'rx-11': free name [ 1434.318331] kobject: 'rx-10' (00000000fbe32c25): kobject_cleanup, parent 0000000023c45d06 [ 1434.326651] kobject: 'rx-10' (00000000fbe32c25): auto cleanup 'remove' event [ 1434.334017] kobject: 'rx-10' (00000000fbe32c25): kobject_uevent_env [ 1434.340518] kobject: 'rx-10' (00000000fbe32c25): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.350853] kobject: 'rx-10' (00000000fbe32c25): auto cleanup kobject_del [ 1434.357899] kobject: 'rx-10' (00000000fbe32c25): calling ktype release [ 1434.364564] kobject: 'rx-10': free name [ 1434.368622] kobject: 'rx-9' (0000000094af63f0): kobject_cleanup, parent 0000000023c45d06 [ 1434.376857] kobject: 'rx-9' (0000000094af63f0): auto cleanup 'remove' event [ 1434.383981] kobject: 'rx-9' (0000000094af63f0): kobject_uevent_env [ 1434.390332] kobject: 'rx-9' (0000000094af63f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.400398] kobject: 'rx-9' (0000000094af63f0): auto cleanup kobject_del [ 1434.407268] kobject: 'rx-9' (0000000094af63f0): calling ktype release [ 1434.413868] kobject: 'rx-9': free name [ 1434.417774] kobject: 'rx-8' (000000008fa2e654): kobject_cleanup, parent 0000000023c45d06 [ 1434.425982] kobject: 'rx-8' (000000008fa2e654): auto cleanup 'remove' event [ 1434.433095] kobject: 'rx-8' (000000008fa2e654): kobject_uevent_env [ 1434.439431] kobject: 'rx-8' (000000008fa2e654): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.449519] kobject: 'rx-8' (000000008fa2e654): auto cleanup kobject_del [ 1434.456384] kobject: 'rx-8' (000000008fa2e654): calling ktype release [ 1434.462991] kobject: 'rx-8': free name [ 1434.466893] kobject: 'rx-7' (0000000020350ff7): kobject_cleanup, parent 0000000023c45d06 [ 1434.475160] kobject: 'rx-7' (0000000020350ff7): auto cleanup 'remove' event [ 1434.482274] kobject: 'rx-7' (0000000020350ff7): kobject_uevent_env [ 1434.488611] kobject: 'rx-7' (0000000020350ff7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.500310] kobject: 'rx-7' (0000000020350ff7): auto cleanup kobject_del [ 1434.507191] kobject: 'rx-7' (0000000020350ff7): calling ktype release [ 1434.513805] kobject: 'rx-7': free name [ 1434.517727] kobject: 'rx-6' (00000000a45068f4): kobject_cleanup, parent 0000000023c45d06 [ 1434.525936] kobject: 'rx-6' (00000000a45068f4): auto cleanup 'remove' event [ 1434.533050] kobject: 'rx-6' (00000000a45068f4): kobject_uevent_env [ 1434.540726] kobject: 'rx-6' (00000000a45068f4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.550798] kobject: 'rx-6' (00000000a45068f4): auto cleanup kobject_del [ 1434.557689] kobject: 'rx-6' (00000000a45068f4): calling ktype release [ 1434.564250] kobject: 'rx-6': free name [ 1434.568190] kobject: 'rx-5' (00000000c7d22b50): kobject_cleanup, parent 0000000023c45d06 [ 1434.576446] kobject: 'rx-5' (00000000c7d22b50): auto cleanup 'remove' event [ 1434.583590] kobject: 'rx-5' (00000000c7d22b50): kobject_uevent_env [ 1434.589927] kobject: 'rx-5' (00000000c7d22b50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.600095] kobject: 'rx-5' (00000000c7d22b50): auto cleanup kobject_del [ 1434.606962] kobject: 'rx-5' (00000000c7d22b50): calling ktype release [ 1434.613558] kobject: 'rx-5': free name [ 1434.617449] kobject: 'rx-4' (00000000b9207613): kobject_cleanup, parent 0000000023c45d06 [ 1434.625701] kobject: 'rx-4' (00000000b9207613): auto cleanup 'remove' event [ 1434.632816] kobject: 'rx-4' (00000000b9207613): kobject_uevent_env [ 1434.639157] kobject: 'rx-4' (00000000b9207613): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.649243] kobject: 'rx-4' (00000000b9207613): auto cleanup kobject_del [ 1434.656098] kobject: 'rx-4' (00000000b9207613): calling ktype release [ 1434.662930] kobject: 'rx-4': free name [ 1434.666818] kobject: 'rx-3' (00000000d43bb130): kobject_cleanup, parent 0000000023c45d06 [ 1434.675063] kobject: 'rx-3' (00000000d43bb130): auto cleanup 'remove' event [ 1434.682173] kobject: 'rx-3' (00000000d43bb130): kobject_uevent_env [ 1434.688507] kobject: 'rx-3' (00000000d43bb130): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.698575] kobject: 'rx-3' (00000000d43bb130): auto cleanup kobject_del [ 1434.705431] kobject: 'rx-3' (00000000d43bb130): calling ktype release [ 1434.712020] kobject: 'rx-3': free name [ 1434.715907] kobject: 'rx-2' (000000005803c867): kobject_cleanup, parent 0000000023c45d06 [ 1434.724151] kobject: 'rx-2' (000000005803c867): auto cleanup 'remove' event [ 1434.731276] kobject: 'rx-2' (000000005803c867): kobject_uevent_env [ 1434.737611] kobject: 'rx-2' (000000005803c867): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.747677] kobject: 'rx-2' (000000005803c867): auto cleanup kobject_del [ 1434.754517] kobject: 'rx-2' (000000005803c867): calling ktype release [ 1434.761115] kobject: 'rx-2': free name [ 1434.765003] kobject: 'rx-1' (000000009cb059a3): kobject_cleanup, parent 0000000023c45d06 [ 1434.773249] kobject: 'rx-1' (000000009cb059a3): auto cleanup 'remove' event [ 1434.780374] kobject: 'rx-1' (000000009cb059a3): kobject_uevent_env [ 1434.786693] kobject: 'rx-1' (000000009cb059a3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.796800] kobject: 'rx-1' (000000009cb059a3): auto cleanup kobject_del [ 1434.803712] kobject: 'rx-1' (000000009cb059a3): calling ktype release [ 1434.810304] kobject: 'rx-1': free name [ 1434.814193] kobject: 'rx-0' (000000000c4dc623): kobject_cleanup, parent 0000000023c45d06 [ 1434.822460] kobject: 'rx-0' (000000000c4dc623): auto cleanup 'remove' event [ 1434.829571] kobject: 'rx-0' (000000000c4dc623): kobject_uevent_env [ 1434.835887] kobject: 'rx-0' (000000000c4dc623): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.845971] kobject: 'rx-0' (000000000c4dc623): auto cleanup kobject_del [ 1434.852872] kobject: 'rx-0' (000000000c4dc623): calling ktype release [ 1434.859474] kobject: 'rx-0': free name [ 1434.863390] kobject: 'tx-15' (00000000f0e34e2e): kobject_cleanup, parent 0000000023c45d06 [ 1434.871761] kobject: 'tx-15' (00000000f0e34e2e): auto cleanup 'remove' event [ 1434.878978] kobject: 'tx-15' (00000000f0e34e2e): kobject_uevent_env [ 1434.885370] kobject: 'tx-15' (00000000f0e34e2e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.895535] kobject: 'tx-15' (00000000f0e34e2e): auto cleanup kobject_del [ 1434.902614] kobject: 'tx-15' (00000000f0e34e2e): calling ktype release [ 1434.909376] kobject: 'tx-15': free name [ 1434.913409] kobject: 'tx-14' (00000000bead5240): kobject_cleanup, parent 0000000023c45d06 [ 1434.921797] kobject: 'tx-14' (00000000bead5240): auto cleanup 'remove' event [ 1434.929019] kobject: 'tx-14' (00000000bead5240): kobject_uevent_env [ 1434.935435] kobject: 'tx-14' (00000000bead5240): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.945657] kobject: 'tx-14' (00000000bead5240): auto cleanup kobject_del [ 1434.952646] kobject: 'tx-14' (00000000bead5240): calling ktype release [ 1434.959341] kobject: 'tx-14': free name [ 1434.963364] kobject: 'tx-13' (0000000016d5526e): kobject_cleanup, parent 0000000023c45d06 [ 1434.971729] kobject: 'tx-13' (0000000016d5526e): auto cleanup 'remove' event [ 1434.978943] kobject: 'tx-13' (0000000016d5526e): kobject_uevent_env [ 1434.985352] kobject: 'tx-13' (0000000016d5526e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1434.995542] kobject: 'tx-13' (0000000016d5526e): auto cleanup kobject_del [ 1435.002557] kobject: 'tx-13' (0000000016d5526e): calling ktype release [ 1435.009248] kobject: 'tx-13': free name [ 1435.013267] kobject: 'tx-12' (000000005c086b19): kobject_cleanup, parent 0000000023c45d06 [ 1435.021638] kobject: 'tx-12' (000000005c086b19): auto cleanup 'remove' event [ 1435.028886] kobject: 'tx-12' (000000005c086b19): kobject_uevent_env [ 1435.035281] kobject: 'tx-12' (000000005c086b19): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.045496] kobject: 'tx-12' (000000005c086b19): auto cleanup kobject_del [ 1435.052512] kobject: 'tx-12' (000000005c086b19): calling ktype release [ 1435.059244] kobject: 'tx-12': free name [ 1435.063275] kobject: 'tx-11' (000000005bd76ab2): kobject_cleanup, parent 0000000023c45d06 [ 1435.071634] kobject: 'tx-11' (000000005bd76ab2): auto cleanup 'remove' event [ 1435.078860] kobject: 'tx-11' (000000005bd76ab2): kobject_uevent_env [ 1435.085256] kobject: 'tx-11' (000000005bd76ab2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.095449] kobject: 'tx-11' (000000005bd76ab2): auto cleanup kobject_del [ 1435.102489] kobject: 'tx-11' (000000005bd76ab2): calling ktype release [ 1435.109281] kobject: 'tx-11': free name [ 1435.113299] kobject: 'tx-10' (00000000cbe2c667): kobject_cleanup, parent 0000000023c45d06 [ 1435.121680] kobject: 'tx-10' (00000000cbe2c667): auto cleanup 'remove' event [ 1435.128899] kobject: 'tx-10' (00000000cbe2c667): kobject_uevent_env [ 1435.135292] kobject: 'tx-10' (00000000cbe2c667): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.145555] kobject: 'tx-10' (00000000cbe2c667): auto cleanup kobject_del [ 1435.152586] kobject: 'tx-10' (00000000cbe2c667): calling ktype release [ 1435.159296] kobject: 'tx-10': free name [ 1435.163310] kobject: 'tx-9' (000000006ec0f418): kobject_cleanup, parent 0000000023c45d06 [ 1435.171799] kobject: 'tx-9' (000000006ec0f418): auto cleanup 'remove' event [ 1435.178948] kobject: 'tx-9' (000000006ec0f418): kobject_uevent_env [ 1435.185258] kobject: 'tx-9' (000000006ec0f418): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.195412] kobject: 'tx-9' (000000006ec0f418): auto cleanup kobject_del [ 1435.202374] kobject: 'tx-9' (000000006ec0f418): calling ktype release [ 1435.209034] kobject: 'tx-9': free name [ 1435.212972] kobject: 'tx-8' (00000000cdf2285e): kobject_cleanup, parent 0000000023c45d06 [ 1435.221279] kobject: 'tx-8' (00000000cdf2285e): auto cleanup 'remove' event [ 1435.228444] kobject: 'tx-8' (00000000cdf2285e): kobject_uevent_env [ 1435.234765] kobject: 'tx-8' (00000000cdf2285e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.252648] kobject: 'tx-8' (00000000cdf2285e): auto cleanup kobject_del [ 1435.259670] kobject: 'tx-8' (00000000cdf2285e): calling ktype release [ 1435.266292] kobject: 'tx-8': free name [ 1435.270566] kobject: 'tx-7' (00000000fcbf958e): kobject_cleanup, parent 0000000023c45d06 [ 1435.287385] kobject: 'tx-7' (00000000fcbf958e): auto cleanup 'remove' event [ 1435.294805] kobject: 'tx-7' (00000000fcbf958e): kobject_uevent_env [ 1435.303691] kobject: 'tx-7' (00000000fcbf958e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.314096] kobject: 'tx-7' (00000000fcbf958e): auto cleanup kobject_del [ 1435.321152] kobject: 'tx-7' (00000000fcbf958e): calling ktype release [ 1435.327825] kobject: 'tx-7': free name [ 1435.331918] kobject: 'tx-6' (00000000cd1eaf06): kobject_cleanup, parent 0000000023c45d06 [ 1435.340271] kobject: 'tx-6' (00000000cd1eaf06): auto cleanup 'remove' event [ 1435.347625] kobject: 'tx-6' (00000000cd1eaf06): kobject_uevent_env [ 1435.354136] kobject: 'tx-6' (00000000cd1eaf06): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.364327] kobject: 'tx-6' (00000000cd1eaf06): auto cleanup kobject_del [ 1435.371346] kobject: 'tx-6' (00000000cd1eaf06): calling ktype release [ 1435.378007] kobject: 'tx-6': free name [ 1435.382066] kobject: 'tx-5' (00000000e2828354): kobject_cleanup, parent 0000000023c45d06 [ 1435.390437] kobject: 'tx-5' (00000000e2828354): auto cleanup 'remove' event [ 1435.397661] kobject: 'tx-5' (00000000e2828354): kobject_uevent_env [ 1435.404032] kobject: 'tx-5' (00000000e2828354): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.419933] kobject: 'tx-5' (00000000e2828354): auto cleanup kobject_del [ 1435.426995] kobject: 'tx-5' (00000000e2828354): calling ktype release [ 1435.433779] kobject: 'tx-5': free name [ 1435.437895] kobject: 'tx-4' (00000000ab5a427a): kobject_cleanup, parent 0000000023c45d06 [ 1435.446152] kobject: 'tx-4' (00000000ab5a427a): auto cleanup 'remove' event [ 1435.453406] kobject: 'tx-4' (00000000ab5a427a): kobject_uevent_env [ 1435.459948] kobject: 'tx-4' (00000000ab5a427a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.470281] kobject: 'tx-4' (00000000ab5a427a): auto cleanup kobject_del [ 1435.477258] kobject: 'tx-4' (00000000ab5a427a): calling ktype release [ 1435.484030] kobject: 'tx-4': free name [ 1435.488269] kobject: 'tx-3' (000000009f8f466f): kobject_cleanup, parent 0000000023c45d06 [ 1435.496723] kobject: 'tx-3' (000000009f8f466f): auto cleanup 'remove' event [ 1435.504001] kobject: 'tx-3' (000000009f8f466f): kobject_uevent_env [ 1435.510441] kobject: 'tx-3' (000000009f8f466f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.520598] kobject: 'tx-3' (000000009f8f466f): auto cleanup kobject_del [ 1435.527908] kobject: 'tx-3' (000000009f8f466f): calling ktype release [ 1435.534527] kobject: 'tx-3': free name [ 1435.538919] kobject: 'tx-2' (00000000f931c102): kobject_cleanup, parent 0000000023c45d06 [ 1435.547213] kobject: 'tx-2' (00000000f931c102): auto cleanup 'remove' event [ 1435.554646] kobject: 'tx-2' (00000000f931c102): kobject_uevent_env [ 1435.561289] kobject: 'tx-2' (00000000f931c102): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.571506] kobject: 'tx-2' (00000000f931c102): auto cleanup kobject_del [ 1435.578622] kobject: 'tx-2' (00000000f931c102): calling ktype release [ 1435.585305] kobject: 'tx-2': free name [ 1435.589368] kobject: 'tx-1' (00000000620b6608): kobject_cleanup, parent 0000000023c45d06 [ 1435.597818] kobject: 'tx-1' (00000000620b6608): auto cleanup 'remove' event [ 1435.604955] kobject: 'tx-1' (00000000620b6608): kobject_uevent_env [ 1435.611363] kobject: 'tx-1' (00000000620b6608): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.621536] kobject: 'tx-1' (00000000620b6608): auto cleanup kobject_del [ 1435.628497] kobject: 'tx-1' (00000000620b6608): calling ktype release [ 1435.635104] kobject: 'tx-1': free name [ 1435.639145] kobject: 'tx-0' (0000000050542d97): kobject_cleanup, parent 0000000023c45d06 [ 1435.647389] kobject: 'tx-0' (0000000050542d97): auto cleanup 'remove' event [ 1435.654608] kobject: 'tx-0' (0000000050542d97): kobject_uevent_env [ 1435.661024] kobject: 'tx-0' (0000000050542d97): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.671179] kobject: 'tx-0' (0000000050542d97): auto cleanup kobject_del [ 1435.678241] kobject: 'tx-0' (0000000050542d97): calling ktype release [ 1435.684843] kobject: 'tx-0': free name [ 1435.688916] kobject: 'queues' (0000000023c45d06): kobject_cleanup, parent (null) [ 1435.697337] kobject: 'queues' (0000000023c45d06): calling ktype release [ 1435.704315] kobject: 'queues' (0000000023c45d06): kset_release [ 1435.710381] kobject: 'queues': free name [ 1435.714897] kobject: 'bond0' (00000000f3078686): kobject_uevent_env [ 1435.721388] kobject: 'bond0' (00000000f3078686): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.733582] kobject: 'rx-0' (00000000b8395d50): kobject_cleanup, parent 000000006cefb79a [ 1435.742039] kobject: 'rx-0' (00000000b8395d50): auto cleanup 'remove' event [ 1435.749237] kobject: 'rx-0' (00000000b8395d50): kobject_uevent_env [ 1435.755570] kobject: 'rx-0' (00000000b8395d50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.765798] kobject: 'rx-0' (00000000b8395d50): auto cleanup kobject_del [ 1435.772884] kobject: 'rx-0' (00000000b8395d50): calling ktype release [ 1435.783192] kobject: 'rx-0': free name [ 1435.787245] kobject: 'tx-0' (00000000040c3d1a): kobject_cleanup, parent 000000006cefb79a [ 1435.795668] kobject: 'tx-0' (00000000040c3d1a): auto cleanup 'remove' event [ 1435.802977] kobject: 'tx-0' (00000000040c3d1a): kobject_uevent_env [ 1435.809612] kobject: 'tx-0' (00000000040c3d1a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.820029] kobject: 'tx-0' (00000000040c3d1a): auto cleanup kobject_del [ 1435.827118] kobject: 'tx-0' (00000000040c3d1a): calling ktype release [ 1435.834026] kobject: 'tx-0': free name [ 1435.838157] kobject: 'queues' (000000006cefb79a): kobject_cleanup, parent (null) [ 1435.846608] kobject: 'queues' (000000006cefb79a): calling ktype release [ 1435.853557] kobject: 'queues' (000000006cefb79a): kset_release [ 1435.859611] kobject: 'queues': free name [ 1435.864113] kobject: 'vcan0' (00000000c1a920e6): kobject_uevent_env [ 1435.870593] kobject: 'vcan0' (00000000c1a920e6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.918210] kobject: 'rx-0' (000000001517e88e): kobject_cleanup, parent 000000003f827c50 [ 1435.926505] kobject: 'rx-0' (000000001517e88e): auto cleanup 'remove' event [ 1435.933953] kobject: 'rx-0' (000000001517e88e): kobject_uevent_env [ 1435.940383] kobject: 'rx-0' (000000001517e88e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1435.950762] kobject: 'rx-0' (000000001517e88e): auto cleanup kobject_del [ 1435.957739] kobject: 'rx-0' (000000001517e88e): calling ktype release [ 1435.964325] kobject: 'rx-0': free name [ 1435.968353] kobject: 'tx-0' (00000000e80d3853): kobject_cleanup, parent 000000003f827c50 [ 1435.976608] kobject: 'tx-0' (00000000e80d3853): auto cleanup 'remove' event [ 1435.983853] kobject: 'tx-0' (00000000e80d3853): kobject_uevent_env [ 1435.990236] kobject: 'tx-0' (00000000e80d3853): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1436.000403] kobject: 'tx-0' (00000000e80d3853): auto cleanup kobject_del [ 1436.007391] kobject: 'tx-0' (00000000e80d3853): calling ktype release [ 1436.014169] kobject: 'tx-0': free name [ 1436.018163] kobject: 'queues' (000000003f827c50): kobject_cleanup, parent (null) [ 1436.026688] kobject: 'queues' (000000003f827c50): calling ktype release [ 1436.033712] kobject: 'queues' (000000003f827c50): kset_release [ 1436.041307] kobject: 'queues': free name [ 1436.045737] kobject: 'bridge0' (00000000e76fc444): kobject_uevent_env [ 1436.052635] kobject: 'bridge0' (00000000e76fc444): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1436.067470] kobject: 'rx-0' (00000000e5d04cf5): kobject_cleanup, parent 000000001103b0a1 [ 1436.076056] kobject: 'rx-0' (00000000e5d04cf5): auto cleanup 'remove' event [ 1436.083479] kobject: 'rx-0' (00000000e5d04cf5): kobject_uevent_env [ 1436.089954] kobject: 'rx-0' (00000000e5d04cf5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1436.100167] kobject: 'rx-0' (00000000e5d04cf5): auto cleanup kobject_del [ 1436.107215] kobject: 'rx-0' (00000000e5d04cf5): calling ktype release [ 1436.114071] kobject: 'rx-0': free name [ 1436.118144] kobject: 'tx-0' (000000002d810110): kobject_cleanup, parent 000000001103b0a1 [ 1436.126432] kobject: 'tx-0' (000000002d810110): auto cleanup 'remove' event [ 1436.133703] kobject: 'tx-0' (000000002d810110): kobject_uevent_env [ 1436.143185] kobject: 'tx-0' (000000002d810110): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1436.153526] kobject: 'tx-0' (000000002d810110): auto cleanup kobject_del [ 1436.160734] kobject: 'tx-0' (000000002d810110): calling ktype release [ 1436.167362] kobject: 'tx-0': free name [ 1436.171511] kobject: 'queues' (000000001103b0a1): kobject_cleanup, parent (null) [ 1436.180277] kobject: 'queues' (000000001103b0a1): calling ktype release [ 1436.187069] kobject: 'queues' (000000001103b0a1): kset_release [ 1436.193430] kobject: 'queues': free name [ 1436.198586] kobject: 'lo' (0000000098efdaa9): kobject_uevent_env [ 1436.204777] kobject: 'lo' (0000000098efdaa9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1436.216478] kobject: 'brif' (00000000d4523df5): kobject_cleanup, parent 000000004b25cc4e [ 1436.225287] kobject: 'brif' (00000000d4523df5): auto cleanup kobject_del [ 1436.232622] kobject: 'brif' (00000000d4523df5): calling ktype release [ 1436.247672] kobject: (00000000d4523df5): dynamic_kobj_release [ 1436.253758] kobject: 'brif': free name [ 1436.298609] kobject: 'rx-0' (00000000d3f07875): kobject_cleanup, parent 0000000045ce2fd0 [ 1436.306960] kobject: 'rx-0' (00000000d3f07875): auto cleanup 'remove' event [ 1436.314441] kobject: 'rx-0' (00000000d3f07875): kobject_uevent_env [ 1436.327850] kobject: 'rx-0' (00000000d3f07875): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 1436.339542] kobject: 'rx-0' (00000000d3f07875): auto cleanup kobject_del [ 1436.347130] kobject: 'rx-0' (00000000d3f07875): calling ktype release [ 1436.355284] kobject: 'rx-0': free name [ 1436.359510] kobject: 'tx-0' (0000000091cc7312): kobject_cleanup, parent 0000000045ce2fd0 [ 1436.367967] kobject: 'tx-0' (0000000091cc7312): auto cleanup 'remove' event [ 1436.375127] kobject: 'tx-0' (0000000091cc7312): kobject_uevent_env [ 1436.381654] kobject: 'tx-0' (0000000091cc7312): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 1436.392298] kobject: 'tx-0' (0000000091cc7312): auto cleanup kobject_del [ 1436.399577] kobject: 'tx-0' (0000000091cc7312): calling ktype release [ 1436.406284] kobject: 'tx-0': free name [ 1436.410567] kobject: 'queues' (0000000045ce2fd0): kobject_cleanup, parent (null) [ 1436.421005] kobject: 'queues' (0000000045ce2fd0): calling ktype release [ 1436.428092] kobject: 'queues' (0000000045ce2fd0): kset_release [ 1436.434246] kobject: 'queues': free name [ 1436.439233] kobject: 'þ€' (000000004b25cc4e): kobject_uevent_env [ 1436.445531] kobject: 'þ€' (000000004b25cc4e): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 1436.456708] kobject: 'ieee80211' (000000005407010f): kobject_add_internal: parent: 'hwsim3778', set: '(null)' [ 1436.467069] kobject: 'phy3775' (00000000be0751e6): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1436.477777] kobject: 'phy3775' (00000000be0751e6): kobject_uevent_env [ 1436.484941] kobject: 'phy3775' (00000000be0751e6): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/ieee80211/phy3775' [ 1436.585971] kobject: 'rfkill3775' (00000000fa1d5472): kobject_add_internal: parent: 'phy3775', set: 'devices' [ 1436.598443] kobject: 'rfkill3775' (00000000fa1d5472): kobject_uevent_env [ 1436.599451] kobject: 'regulatory.0' (00000000a2e3dcf7): kobject_uevent_env [ 1436.605434] kobject: 'rfkill3775' (00000000fa1d5472): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/ieee80211/phy3775/rfkill3775' [ 1436.612505] kobject: 'regulatory.0' (00000000a2e3dcf7): fill_kobj_path: path = '/devices/platform/regulatory.0' [ 1436.644824] kobject: 'þ€' (000000004b25cc4e): kobject_cleanup, parent (null) [ 1436.653643] kobject: 'þ€' (00000000e5b80fb3): kobject_cleanup, parent (null) [ 1436.662504] kobject: 'þ€' (000000004b25cc4e): calling ktype release [ 1436.677740] kobject: 'þ€' (00000000e5b80fb3): auto cleanup 'remove' event [ 1436.684840] kobject: 'þ€' (00000000e5b80fb3): kobject_uevent_env [ 1436.691696] kobject: 'þ€': free name [ 1436.696238] kobject: 'þ€' (00000000b85dbc38): kobject_add_internal: parent: 'net', set: 'devices' [ 1436.699039] kobject: 'þ€' (00000000e5b80fb3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1436.715538] kobject: 'þ€' (00000000e5b80fb3): calling ktype release [ 1436.718574] kobject: 'þ€' (00000000b85dbc38): kobject_uevent_env [ 1436.722328] kobject: 'þ€': free name [ 1436.731217] kobject: 'þ€' (00000000b85dbc38): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 1436.740981] kobject: 'queues' (000000006cadd5ce): kobject_add_internal: parent: 'þ€', set: '' [ 1436.750364] kobject: 'queues' (000000006cadd5ce): kobject_uevent_env [ 1436.756896] kobject: 'queues' (000000006cadd5ce): kobject_uevent_env: filter function caused the event to drop! [ 1436.767415] kobject: 'rx-0' (0000000059385d87): kobject_add_internal: parent: 'queues', set: 'queues' [ 1436.776980] kobject: 'rx-0' (0000000059385d87): kobject_uevent_env [ 1436.783514] kobject: 'rx-0' (0000000059385d87): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 1436.793709] kobject: 'tx-0' (000000005a3abe10): kobject_add_internal: parent: 'queues', set: 'queues' [ 1436.803493] kobject: 'tx-0' (000000005a3abe10): kobject_uevent_env [ 1436.809976] kobject: 'tx-0' (000000005a3abe10): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 1436.821108] kobject: 'brif' (00000000098ba2a1): kobject_add_internal: parent: 'þ€', set: '' [ 1436.830797] ieee80211 phy3775: Selected rate control algorithm 'minstrel_ht' [ 1436.840654] kobject: 'net' (000000009f1415e7): kobject_add_internal: parent: 'hwsim3778', set: '(null)' [ 1436.850644] kobject: 'wlan0' (000000005409ce7d): kobject_add_internal: parent: 'net', set: 'devices' [ 1436.860859] kobject: 'wlan0' (000000005409ce7d): kobject_uevent_env [ 1436.867424] kobject: 'wlan0' (000000005409ce7d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/net/wlan0' [ 1436.879181] kobject: 'queues' (0000000008e2e5d9): kobject_add_internal: parent: 'wlan0', set: '' [ 1436.888756] kobject: 'queues' (0000000008e2e5d9): kobject_uevent_env [ 1436.895301] kobject: 'queues' (0000000008e2e5d9): kobject_uevent_env: filter function caused the event to drop! [ 1436.906023] kobject: 'rx-0' (000000007a4060a4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1436.916226] kobject: 'rx-0' (000000007a4060a4): kobject_uevent_env [ 1436.922747] kobject: 'rx-0' (000000007a4060a4): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/net/wlan0/queues/rx-0' [ 1436.935442] kobject: 'tx-0' (00000000429f355b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1436.945186] kobject: 'tx-0' (00000000429f355b): kobject_uevent_env [ 1436.951700] kobject: 'tx-0' (00000000429f355b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/net/wlan0/queues/tx-0' [ 1436.964405] kobject: 'tx-1' (0000000031c72a24): kobject_add_internal: parent: 'queues', set: 'queues' [ 1436.974046] kobject: 'tx-1' (0000000031c72a24): kobject_uevent_env [ 1436.980561] kobject: 'tx-1' (0000000031c72a24): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/net/wlan0/queues/tx-1' [ 1436.993454] kobject: 'tx-2' (0000000027477fae): kobject_add_internal: parent: 'queues', set: 'queues' [ 1437.003357] kobject: 'tx-2' (0000000027477fae): kobject_uevent_env [ 1437.009916] kobject: 'tx-2' (0000000027477fae): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/net/wlan0/queues/tx-2' [ 1437.022771] kobject: 'tx-3' (000000005c43a37d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1437.032528] kobject: 'tx-3' (000000005c43a37d): kobject_uevent_env [ 1437.039097] kobject: 'tx-3' (000000005c43a37d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3778/net/wlan0/queues/tx-3' [ 1437.053147] kobject: 'þ€ð' (0000000022fe515d): kobject_cleanup, parent (null) [ 1437.054800] netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. [ 1437.062291] kobject: 'brif' (00000000098ba2a1): kobject_cleanup, parent 00000000b85dbc38 [ 1437.078509] kobject: 'þ€ð' (0000000022fe515d): auto cleanup 'remove' event [ 1437.085556] kobject: 'þ€ð' (0000000022fe515d): kobject_uevent_env [ 1437.088422] kobject: 'hwsim3779' (000000004aa0831b): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 1437.092377] kobject: 'þ€ð' (0000000022fe515d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1437.113185] kobject: 'brif' (00000000098ba2a1): auto cleanup kobject_del [ 1437.114451] kobject: 'hwsim3779' (000000004aa0831b): kobject_uevent_env [ 1437.120821] kobject: 'brif' (00000000098ba2a1): calling ktype release [ 1437.127104] kobject: 'hwsim3779' (000000004aa0831b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3779' [ 1437.134450] kobject: 'þ€ð' (0000000022fe515d): calling ktype release [ 1437.148632] kobject: 'hwsim3779' (000000004aa0831b): kobject_uevent_env [ 1437.152080] kobject: (00000000098ba2a1): dynamic_kobj_release [ 1437.158485] kobject: 'hwsim3779' (000000004aa0831b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3779' [ 1437.164662] kobject: 'brif': free name [ 1437.180580] kobject: 'þ€ð': free name [ 1437.189877] kobject: 'loop0' (00000000d562eec3): kobject_uevent_env [ 1437.196514] kobject: 'loop0' (00000000d562eec3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1437.228452] kobject: 'rx-0' (0000000059385d87): kobject_cleanup, parent 000000006cadd5ce [ 1437.236904] kobject: 'rx-0' (0000000059385d87): auto cleanup 'remove' event [ 1437.245331] kobject: 'rx-0' (0000000059385d87): kobject_uevent_env [ 1437.253574] kobject: 'rx-0' (0000000059385d87): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 1437.263973] kobject: 'rx-0' (0000000059385d87): auto cleanup kobject_del [ 1437.270976] kobject: 'rx-0' (0000000059385d87): calling ktype release [ 1437.277690] kobject: 'rx-0': free name [ 1437.281690] kobject: 'tx-0' (000000005a3abe10): kobject_cleanup, parent 000000006cadd5ce [ 1437.290054] kobject: 'tx-0' (000000005a3abe10): auto cleanup 'remove' event [ 1437.297309] kobject: 'tx-0' (000000005a3abe10): kobject_uevent_env [ 1437.303882] kobject: 'tx-0' (000000005a3abe10): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 1437.314129] kobject: 'tx-0' (000000005a3abe10): auto cleanup kobject_del [ 1437.321276] kobject: 'tx-0' (000000005a3abe10): calling ktype release [ 1437.327964] kobject: 'tx-0': free name [ 1437.331979] kobject: 'queues' (000000006cadd5ce): kobject_cleanup, parent (null) [ 1437.340582] kobject: 'queues' (000000006cadd5ce): calling ktype release [ 1437.347679] kobject: 'queues' (000000006cadd5ce): kset_release [ 1437.353733] kobject: 'queues': free name [ 1437.358477] kobject: 'þ€' (00000000b85dbc38): kobject_uevent_env [ 1437.365063] kobject: 'þ€' (00000000b85dbc38): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 1437.375331] kobject: 'ieee80211' (00000000b918fb6f): kobject_add_internal: parent: 'hwsim3779', set: '(null)' [ 1437.385614] kobject: 'phy3776' (00000000124cc715): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 1437.396040] kobject: 'phy3776' (00000000124cc715): kobject_uevent_env [ 1437.402839] kobject: 'phy3776' (00000000124cc715): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3779/ieee80211/phy3776' [ 1437.505548] kobject: 'rfkill3776' (000000000b1f637b): kobject_add_internal: parent: 'phy3776', set: 'devices' [ 1437.505625] kobject: 'veth3' (000000003275beca): kobject_cleanup, parent (null) [ 1437.516127] kobject: 'rfkill3776' (000000000b1f637b): kobject_uevent_env [ 1437.524808] kobject: 'þ€' (00000000b85dbc38): kobject_cleanup, parent (null) [ 1437.531248] kobject: 'rfkill3776' (000000000b1f637b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim3779/ieee80211/phy3776/rfkill3776'