x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:51:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) 09:51:26 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xe) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, 0x0) 09:51:26 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) 09:51:26 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:51:26 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) [ 333.806800] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:51:45 executing program 2: openat$sr(0xffffffffffffff9c, &(0x7f0000000a00), 0x480023, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) 09:51:45 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:51:45 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0xfffffffd, 0x0, 0x0, 0x0, 0x2, "77004a6efdff0000000008002600", 0xffffffff, 0x401}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/230, 0xe6, 0x2) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = socket$inet(0x2, 0xa, 0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000300)={'wg2\x00'}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r4 = dup3(r3, r1, 0x80000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) r5 = openat(r4, &(0x7f0000000380)='./file0\x00', 0x1ca00, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000003c0)={'batadv0\x00'}) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) 09:51:45 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:51:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5000000093a8a712c470c59ee932889b45583ddd21fe32778e312c1779fc297238a7bd4f341568c097ebaa44353ad18d94ea1c5030a6ecd3672d0b70ef11ce6d278013be48721e324408c26cc4432a511b49212725f44deef762f517b6708d8749a56e87800df24102ec6083f028639bf81233545624e89b715c85880c4186e2c4bf6a70b84f81678c866332877cf51f010036135dab43c39e5b5809", @ANYRES16=0x0, @ANYBLOB="080028bd7000ffdbdf25030000002600070073797374656d5f753a6f626a6563745f723a646d6573675f657865635f743a7330000000140006006c6f00"/74], 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan1\x00'}) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), r0) 09:51:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) 09:51:45 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x10000, 0x200) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000125bd7000ffdbdf250f00000030000380050008004000000014000600fc0100000000000000000200000000000800030004000000060007004e22000030000280140001000a010101000000000000000000000000060002004e220000060002004e21000008000900be0000008a53bfbf2e9d3092ec474aa954b2a090c506"], 0x74}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\v/file0\x00\x00\x00\x00']) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={0x0, 0x1, 0x6, @remote}, 0x10) syz_mount_image$ext4(&(0x7f00000036c0)='ext4\x00', &(0x7f0000003700)='./file0\x00', 0xffffffff80000000, 0x2, &(0x7f0000004840)=[{&(0x7f0000003740)="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", 0x1000, 0x2}, {&(0x7f0000004740)='3', 0x1}], 0x40000, &(0x7f0000000140)={[], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_eq}]}) creat(&(0x7f0000000040)='./file0\x00', 0x38) 09:51:45 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f00000000c0)="0200000003000000040000006a000f", 0xf, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r1, 0x400, 0x70bd29, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}, @NL80211_ATTR_MULTICAST_TO_UNICAST_ENABLED={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000540)=ANY=[], 0x10) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x3c, r1, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x48}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1a1) creat(&(0x7f0000000380)='./file0\x00', 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r5, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x3}, &(0x7f0000000200)=0x28) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x1b, &(0x7f00000010c0)={@dev}, 0x14) write$P9_RLERRORu(r3, &(0x7f0000000500)={0xe, 0x7, 0x0, {{0x1, '}'}}}, 0xe) [ 340.896713] syz-executor.6 uses obsolete (PF_INET,SOCK_PACKET) 09:51:45 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:51:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 09:51:45 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @empty, 0x6}, 0x1c) getsockopt$inet6_int(r1, 0x29, 0x20, 0x0, &(0x7f0000000140)=0xffffffffffffff0b) 09:51:45 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x9, 0x30842) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000600)={{0x1, 0x1, 0x18, r0, {0x7ff}}, './file0\x00'}) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000640)={0x93, ""/147}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x4) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000540)={0x0, 0xfffffffffffffffb, 0x9f, 0x1, @scatter={0x6, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/81, 0x51}, {&(0x7f0000000140)=""/69, 0x45}, {&(0x7f00000001c0)=""/99, 0x63}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f00000002c0)=""/14, 0xe}, {&(0x7f0000000300)=""/99, 0x63}]}, &(0x7f0000000400)="6bf899f13040c5ad065ac9ea78b8741de543be6f13eaedb4ab116bd257fb021ed6ae20393e4f40170ae28d80253ab7b1d5161b119527bcd02f78b3a841d4759475d2ad5949280905b6d50fd395ebd7f93066fc3162ce4cef05d56723645215f7777a97e72c15e6f02183ba82576383fca55810fc9e76cd44f81b009c77321e0fd66e7e87e1e919ffcd7adbe880139b464f5a685af7e182ee121c2a59ebcd6c", &(0x7f00000004c0)=""/64, 0x0, 0x10013, 0x0, &(0x7f0000000500)}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000700)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) write$binfmt_elf64(r3, &(0x7f00000009c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x4, 0x7f, 0x2b, 0x8, 0x2, 0x3e, 0x0, 0x223, 0x40, 0x77, 0x7, 0x7fff, 0x38, 0x2, 0x0, 0x4, 0x5}, [{0x5, 0x6, 0x7f, 0xe2, 0x29d8b9de, 0x7fd, 0x0, 0x400000000000000}], "aa3534ba327082daa514c8a0233e70", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x887) io_setup(0x7fff, &(0x7f0000000980)=0x0) io_cancel(r4, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x81, 0x100) fremovexattr(r2, &(0x7f00000005c0)=@random={'user.', '-}/!\x00'}) 09:51:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 09:51:45 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:51:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) writev(r1, &(0x7f0000000440), 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r4, &(0x7f0000000000)="8f", 0x1, 0x0) fallocate(r4, 0x20, 0x0, 0x7fffffff000) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x10, r1, 0x8000000) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000005, 0x50, r2, 0x10000000) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r7, &(0x7f0000000200)="62079e", 0x3, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000001c0)=@IORING_OP_STATX={0x15, 0x1, 0x0, r7, &(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x2, 0x100}, 0x5) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x12, r3, 0x0) 09:51:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 353.506354] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:52:05 executing program 0: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001) syz_emit_ethernet(0x3e, &(0x7f00000003c0)={@local, @local, @void, {@ipv4={0x800, @udp={{0xa, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x33, 0x0, @private=0xa010102, @remote, {[@timestamp_addr={0x44, 0xe, 0x6, 0x1, 0x0, [{@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}, {0x0, 0x0, 0x8}}}}}, 0x0) 09:52:05 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) dup2(r0, 0xffffffffffffffff) fchown(r1, 0xee01, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7fff}}, './file1\x00'}) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x3, 0x7, 0x6, 0x7f, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x241, 0x2bb, 0x200, 0x6, 0x9bf, 0x3b28, 0x4, 0x0, 0x2, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r3, 0x2) fcntl$setstatus(r0, 0x4, 0x44c00) 09:52:05 executing program 6: r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000100)=0x7fffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r2, 0x2, &(0x7f0000000a80)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0, 0x0, 0xfffffffffffffffe}]) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0x1, r0, &(0x7f0000000180)="74d962bd1fff29b79b91b53431621e368787af753ca9500cedd4fd11e4660b1775c7c8d612232bc479a6fd1c02f4b9200daedb248c987163967a44e20ab8db2ddfe28a7eb1f3377bdbfc55a2f1fefee0c16eba5e77164fc1afbc9ec57c40921dec7382e713f7157c5d35fa2c9861e2ed444aaaa1de5a9a5bcbad6e6b2a29a5b8fa2f98ada57e66b8be95", 0x8a, 0x1, 0x0, 0x2, r0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140), 0x9}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000202"], 0x1c}, 0x1, 0x0, 0x0, 0x200400c0}, 0x0) 09:52:05 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:52:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = syz_io_uring_complete(0x0) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r4, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRES64=r4, @ANYRES16=r1, @ANYBLOB="010000000000000000000700000008000300", @ANYRESOCT=r2, @ANYBLOB="0800050004000000140004007665746831993a"], 0x38}}, 0x0) 09:52:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x28}}, 0x0) 09:52:05 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:52:05 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:52:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0xffff, 0x3}, 0x6) io_submit(0x0, 0x2, &(0x7f0000000a80)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe}]) clock_gettime(0x0, &(0x7f0000000300)) io_getevents(0x0, 0x7, 0x1, &(0x7f00000002c0)=[{}], &(0x7f0000000380)={0x77359400}) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x4}]) ioctl$sock_bt_hci(r2, 0x400448de, &(0x7f0000000100)="d6e16020104523ba0ff6995d9cc1fb7c37967d4c940a2efecf7641c2d25362d2e4da3ded82f90661a96ee73f6031f6") r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$RTC_ALM_SET(r3, 0x7001, 0x0) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000000)={0x0, 0x2b, 0x0, 0x0, 0x0, 0x5, 0x5}) ioctl$RTC_ALM_SET(r3, 0x40247007, &(0x7f0000000240)={0xd, 0x3b, 0x2, 0x2, 0x5, 0x100, 0x5, 0x124, 0x1}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) [ 361.280250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 374.193020] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:52:26 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000003f40)={[], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@context={'context', 0x3d, 'staff_u'}}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x46880, 0x104) openat(r0, &(0x7f0000000040)='./file0/../file0\x00', 0x84141, 0x100) 09:52:26 executing program 4: syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x208801) 09:52:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, &(0x7f0000000040)=0x200, 0x100000001) 09:52:26 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:52:26 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:52:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x28}}, 0x0) 09:52:26 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x13c, 0x1a, 0x4, 0x0, 0x0, {{@in=@remote, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@private, 0x0, 0x2b}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'xcbc(aes)\x00'}}}]}, 0x13c}}, 0x0) 09:52:26 executing program 6: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000200)="62079e", 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x8, 0x70bd25, 0x25dfdbfe, {{}, {}, {0x14, 0x19, {0x2, 0x3, 0x3, 0xf3}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20000885) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x2, &(0x7f0000000200)=[{&(0x7f0000001540)="eb2881427f248548b7571c4900dd13568fe6966877c2646233a9eeba8d85d8e23464002000", 0x25}, {0x0, 0x0, 0x7}], 0x80, &(0x7f0000001580)=ANY=[@ANYRESOCT]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42e2, 0x0) ftruncate(r1, 0x4) r2 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0xc755, 0x3, &(0x7f00000013c0)=[{&(0x7f0000000340)="1d2386ab6594a94ec12f1ae4871ffa634ba86609f1d1f808cc196a1cace26aa69f9ca12aa13472fca15aa5197174d39feb4a4782ef98f0bc564a6c9d", 0x3c, 0xfffffffffffffffc}, {&(0x7f0000000380)="1615026f5d64ac062425033054001c70b853404a5b5af30e376f520cfa74546f8ff12d3610782e180addc0c1fcf76c32c2ab1113457d622fde017a7e", 0x3c, 0x4}, {&(0x7f00000003c0)="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", 0x1000, 0x6d}], 0x20, &(0x7f0000001440)={[{@utf8}, {@shortname_winnt}, {@shortname_win95}, {@shortname_win95}, {@rodir}, {@nonumtail}, {@uni_xlate}], [{@smackfsroot}]}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000001500)={{0x1, 0x1, 0x18, r1, @in_args={0x4}}, './file0\x00'}) fcntl$dupfd(r3, 0x0, r0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0), 0x8000, 0x0) r5 = openat(r4, &(0x7f0000001600)='./file0\x00', 0x610000, 0x100) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f0000001740)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001700)={&(0x7f0000001680)={0x68, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x212790d7, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000820) openat(r2, &(0x7f00000014c0)='./file0\x00', 0x20880, 0x149) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x13, r1, 0x0) syz_io_uring_complete(r6) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) pwrite64(r1, &(0x7f0000000240)='9', 0x20000241, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000001780)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="06000000000000002e2f66696c6530005a16786527f41be995aac9ac51f125c3305946e0c1bc86e76380782a54d9742ed901ea0e0b1bba24498945b3537666f447b444851558e32bc17562b1502937123b19943c6283690c2c28c73aa7a20c4815e461fbb5d331f768b8c98c26b254a7e169895c8b8cdbfdc327e5369b940bc200a6dcb33c0ef0d33c7962834ba212469eda8e0bd8af93c3b7ccce8652d34d2e2aec0e73e350d5d505a60f7542f4e867d00e53e0baa57826d1d6abeaa7f52ca915189541c433237463a0f828b52e91fe7848c8f5192488f30e6ee6691d2ee3191e56e0ec88e87c3def9c1478ba472eae171e0ea60a8503423d43eab9ada88c1cd7712f16ec65244c4f25becc8aeff253824fd473d218c43b897edacbcdc428284e892475e195b983619bebe11143da46dc9a9bd12d70f9bd2507af89f15581bb4504ee315784b9870e5a89a7facf4f332e30de861ea9afd56c8b8a7c05da8d0ebfd8e040c0114d491d81d922c759f6be10ea5b6b7348921effcb"]) ioctl$EXT4_IOC_SWAP_BOOT(r7, 0x6611) [ 381.894410] SELinux: duplicate or incompatible mount options [ 381.901555] SELinux: duplicate or incompatible mount options 09:52:26 executing program 0: poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x48}], 0x1, 0x81) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 381.953752] FAT-fs (loop6): Unrecognized mount option "01777777777777777777777" or missing value 09:52:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x28}}, 0x0) 09:52:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="f2c0b00a0a73e255b2c6", 0xa}], 0x1, 0xfff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r0) r1 = openat(0xffffffffffffffff, 0x0, 0x440900, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) fcntl$setstatus(r2, 0x4, 0x0) pwritev(r2, &(0x7f00000003c0)=[{&(0x7f00000002c0)="d626", 0x2}], 0x1, 0x0, 0x0) r3 = accept4$unix(r0, 0x0, &(0x7f00000000c0), 0x100000) sendfile(r3, r1, &(0x7f0000000140)=0x5, 0x1) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r4, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$int_out(r4, 0x2, &(0x7f0000000200)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r5, r2, 0x0, 0xd315) r6 = openat$cgroup_freezer_state(r2, &(0x7f0000000180), 0x2, 0x0) pwrite64(r6, &(0x7f00000001c0)="f27cd8eba41a12f7822b10b271af4d739b63c5ae166dd2814e7ef3a834d10776aaf4ddca34a146405daf1290a729fbdaab14a0", 0x33, 0xfffffffffffffffe) 09:52:26 executing program 7: ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x1, 0x2000000000000009, 0xfffffffffffffffa, 0xffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x809c2, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x400001, 0x10a) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000180)={0x7, 0x7f, 0x3}, 0x7) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x2800082, 0x0) socket$packet(0x11, 0x2, 0x300) unshare(0x62040080) write$P9_ROPEN(r0, &(0x7f0000000140)={0x18, 0x71, 0x1, {{0x915afe8657c0a1b3, 0x4, 0x7}, 0xc02}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000300)='./file0\x00') setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x40, 0x0, @loopback}}, 0x0, 0x0, 0x2a, 0x0, "4c774fc207b2764cc639d766f1a8bf75fa858b606ad21530ecaf8b152bc099032178945d2ed02d555131e75488a37329ea68553a3c06f898b0415d06e9edb87c74d7bb428a4657b3929ce7c15f973a5f"}, 0xd8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) io_submit(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0xc, 0x100000001, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 397.060759] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:52:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0xc) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000000)) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x1e, 0xc0b12afe4b722e85, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x9, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x24}}, 0x0) 09:52:49 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000700), r4) sendmsg$IEEE802154_SCAN_REQ(r4, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x3c, 0x0, 0x200, 0x70b529, 0x25dfdbff, {}, [@IEEE802154_ATTR_DURATION={0x5, 0x15, 0xeb}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x3}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x20}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x8}, @IEEE802154_ATTR_SCAN_TYPE={0x5, 0x13, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x500}, 0x20004081) sendmsg$IEEE802154_LLSEC_LIST_DEV(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r0) sendmsg$NL802154_CMD_NEW_INTERFACE(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFTYPE={0x8, 0x5, 0xffffffffffffffff}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0302}}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0302}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40d0}, 0x10851) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)={0x40, r2, 0x1, 0x0, 0x0, {0x1, 0x9}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x144e3d8b}]}]}]}, 0x40}}, 0x0) 09:52:49 executing program 3: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:52:49 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="100400001200cd610000000000000000"], 0x10}}, 0x0) 09:52:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[], 0x28}}, 0x0) 09:52:49 executing program 0: prctl$PR_GET_TIMERSLACK(0x1e) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0xd0) 09:52:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, &(0x7f0000000040)=0x200, 0x100000001) 09:52:49 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:52:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:52:49 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:52:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x82f39047c1691bdc, 0x8010, 0xffffffffffffffff, 0x8000000) r2 = syz_io_uring_complete(r1) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x17f7, 0x8, 0x1, 0xff, 0x80}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000001c0)=@buf={0x3a, &(0x7f0000000180)="6adcdb3a8896883d37b1fb02959f473f2ba2ec3fa25d8b5cfee295eff5c572ffdbce428e01f3dab1b6ee2b0dd7b82d7fb217cab8a183eecfc69c"}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) 09:52:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[], 0x28}}, 0x0) 09:52:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000140)={[{@uid={'uid', 0x3d, 0xee00}}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYRES64=r2, @ANYRES32, @ANYRESOCT=r1, @ANYRES32=r1], 0x1c}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000240)=[{&(0x7f0000000200)="1a68f6e1e8850fa363b528363c13ead057556de59d0ddb", 0x17}], 0x1, &(0x7f0000000300)={[{@shortname_winnt}, {@shortname_lower}, {@iocharset={'iocharset', 0x3d, 'cp437'}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@rodir}, {@fat=@showexec}, {@fat=@debug}], [{@uid_gt={'uid>', r2}}, {@subj_role={'subj_role', 0x3d, 'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x34, 0x61, 0x36, 0x62, 0x37, 0x63, 0x30], 0x2d, [0x31, 0x66, 0x33, 0x32], 0x2d, [0x65, 0x34, 0x33, 0x38], 0x2d, [0x36, 0x34, 0x34, 0x30], 0x2d, [0x30, 0x37, 0x32, 0xf93bbcaa2dec3c4b, 0x35, 0x30, 0xc1, 0x35]}}}, {@uid_eq={'uid', 0x3d, r3}}]}) 09:52:49 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d2420100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32303232303739373400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004600000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011700)="20000000945343359453433500000000d3f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000030000000", 0x40, 0x2200}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2280}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2300}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2380}, {&(0x7f0000011c00)="c041000000400000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000800000020000000", 0x40, 0x2a00}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2a80}, {&(0x7f0000011e00)="ed41000000080000d4f4655fd4f4655fd4f4655f00000000000002004000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000d6b05c9300000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2b00}, {&(0x7f0000011f00)="ed8100001a040000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000000da710e000000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2c00}, {&(0x7f0000012000)="ffa1000026000000d4f4655fd4f4655fd4f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3230323230373937342f66696c65302f66696c653000000000000000000000000000000000000000000000d6e8afef00000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x2d00}, {&(0x7f0000012100)="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", 0x1a0, 0x2e00}, {&(0x7f0000012300)="ed81000064000000d4f4655fd4f4655fd4f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000d9d9ad0100000000000000000000000000000000000000000000000020000000945343359453433594534335d4f4655f945343350000000000000000", 0xa0, 0x3000}, {&(0x7f0000012400)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012500)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x10000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13800}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x19400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x20400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000800300"/96, 0x60, 0x21400}, {&(0x7f0000013900)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x28000}, {&(0x7f0000013a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}, {&(0x7f0000013f00)='syzkallers\x00'/32, 0x20, 0x38000}, {&(0x7f0000014000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x48000}], 0x0, &(0x7f0000014100)) creat(&(0x7f0000000040)='./file0\x00', 0x24) 09:52:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x82f39047c1691bdc, 0x8010, 0xffffffffffffffff, 0x8000000) r2 = syz_io_uring_complete(r1) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000140)={0x17f7, 0x8, 0x1, 0xff, 0x80}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000001c0)=@buf={0x3a, &(0x7f0000000180)="6adcdb3a8896883d37b1fb02959f473f2ba2ec3fa25d8b5cfee295eff5c572ffdbce428e01f3dab1b6ee2b0dd7b82d7fb217cab8a183eecfc69c"}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) [ 404.917670] FAT-fs (loop4): Unrecognized mount option "uid>00000000000000016877" or missing value [ 404.996214] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 417.061240] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:53:08 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:53:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[], 0x28}}, 0x0) 09:53:08 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:53:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0xf8, 0x2d, 0x800, 0x70bd2c, 0x25dfdbff, {0x15}, [@generic="43d127cd74646ca05c035dc6aaa3dd6639b3d59f487665310facc0251ce76606b5dd7c0057574d", @generic="a686f368c57677d2ffcb6717a54b09fb29aa14c7033a93175cd426d0afe06a1014354164ff3a510181a0c4b908812eabfaa03ba16de2fb0845105bac6c845f294f8281b977e033db59a56f5f62ef41af1612138b0faad27d2d130a15dd1f3be37041cc54b741863da1adc047cde8fe5260e1a1c9673c9a605c4ddd4936db63280554e565513dfa4e05512dd486f50db23d88d9561800a2f4a2eb53d698c594d0ad3e3d6ff4a413c3364e991d8f1757bc40a64d6cda784915a2a5aad510"]}, 0xf8}, 0x1, 0x0, 0x0, 0x8000}, 0xc044815) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xe9, 0x39}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x76}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x6f}]}, 0x38}, 0x1, 0x0, 0x0, 0x24044840}, 0x10000000) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000038e9ba7449a41e5464da081c00210c00"], 0x44}, 0x1, 0x0, 0x0, 0x8003}, 0x0) 09:53:08 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000300)="cc904745fe4e342567482ca29cd14657bf4a75ed2e469f49f1a8eb2be0e79d7992f77a8b0674cb502d8483ea0d86710273ba52747f4a8dbcefd4bf2bd28e9b86199e611e60cc41dd3dc131d79198a21e40bbb79b8541bc1e97c69f87587cfa786452501c9c1bd3abe2f43c64537c034283abaa9156", 0x75, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r1) sendmsg$NL80211_CMD_FLUSH_PMKSA(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="200026bd7025360000000c00990003f3ffff4f000000"], 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client}, {@version_9p2000}]}}) socket$packet(0x11, 0x3, 0x300) 09:53:08 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) io_setup(0x5, &(0x7f0000000700)=0x0) ioctl$CDROMMULTISESSION(r0, 0x5310, &(0x7f0000000000)={@lba=0x7, 0x1, 0x3}) io_submit(r1, 0x1, &(0x7f0000000840)=[&(0x7f00000000c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, &(0x7f00000001c0)="f0", 0x1}]) ioctl$DVD_READ_STRUCT(r0, 0x5390, &(0x7f0000000880)=@bca={0x3, 0xbc, "4d24ff6c059a1bc2aa54ae50f1f0dc7a1afa3850cede5c8152931616da6279f64dabd5b7ea87ad29b363e15c9609947aaf76fa106c9412bd9fd57c38c547e217466257e181bcac12639b4b00fc766780801ec52cb2194aa2f79dc5da7c7bcf93deb52ba5c4e3112b37f358d2c12cc7b048889182cef41925fa52fd27c7158bd3db2e7637f1fa41fcc560eb59648de681bafd62abdfb2dcaa1d2a553ca35b33bef2d4cf348a0f10f0422c48e6dd26464531a2f6a60c3d971b92730db4"}) 09:53:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000007ffffffc) connect$netlink(0xffffffffffffffff, &(0x7f0000000240)=@proc, 0xc) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000200)="62079e", 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xc4, 0x13, 0x800, 0x70bd25, 0x25dfdbff, {0x1e}, [@typed={0xc, 0x74, 0x0, 0x0, @u64=0x1}, @nested={0x99, 0x26, 0x0, 0x1, [@generic="2ef12ff8f0e1d9c241812f806c567ab4f4329c8880ee67c1986e8531dff82566aa8bb889cea2549f04e17738e9bc7d1c20ee19b6442401aff3ea44e5006d39d34bc3a2f6366d6c485ad599710112e09bbd596559b734ae81517587c070", @generic="559c5ea7e702d04200a22fb0b4f69f134c778ca180cb05f721f9abd61346b7bcee8afcc1c604c00596ae1b8afab72a3590b61e7d", @typed={0x4, 0x1d}]}, @typed={0x8, 0x4f, 0x0, 0x0, @uid=0xee01}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40045}, 0x4041) 09:53:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x9, 0x110, r1, 0xee803000) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) [ 424.324203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59704 sclass=netlink_route_socket pid=5013 comm=syz-executor.2 [ 424.338661] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 424.341031] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 424.342538] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 424.343963] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 424.345628] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 0 [ 424.348278] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 424.349658] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 424.351849] Buffer I/O error on dev sr0, logical block 0, async page read [ 424.353674] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 424.354952] blk_update_request: I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 424.357088] Buffer I/O error on dev sr0, logical block 1, async page read [ 424.361067] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 424.362326] blk_update_request: I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 424.364451] Buffer I/O error on dev sr0, logical block 2, async page read [ 424.366031] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 424.367218] blk_update_request: I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 5 prio class 0 [ 424.369415] Buffer I/O error on dev sr0, logical block 3, async page read [ 424.370925] Buffer I/O error on dev sr0, logical block 4, async page read [ 424.372416] Buffer I/O error on dev sr0, logical block 5, async page read [ 424.373971] Buffer I/O error on dev sr0, logical block 6, async page read [ 424.375488] Buffer I/O error on dev sr0, logical block 7, async page read 09:53:08 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 424.397187] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. 09:53:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) [ 424.456564] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 424.459107] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 424.460567] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 424.461965] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 424.463650] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 0 [ 424.481652] sr 1:0:0:0: [sr0] CDROM not ready. Make sure there is a disc in the drive. [ 424.496616] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_SENSE cmd_age=0s [ 424.498670] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 424.500132] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 424.501530] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 02 00 [ 424.503119] blk_update_request: I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 8 prio class 0 [ 424.505226] Buffer I/O error on dev sr0, logical block 0, async page read [ 424.506695] Buffer I/O error on dev sr0, logical block 1, async page read 09:53:08 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x4) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) r2 = syz_io_uring_complete(r1) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) stat(&(0x7f0000000040)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r6, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYRES64=r6, @ANYRES32, @ANYRESOCT=r5, @ANYRES32=r5], 0x1c}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=0xee00, @ANYBLOB="4800000000000004"]) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) creat(&(0x7f0000000000)='./file0\x00', 0x0) 09:53:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b8000000130000000000000000000000ffffffff000000000000000000000000ff02000000000000000000000000000100000000000000000000403c00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x2, 0x1000002) r0 = fsmount(0xffffffffffffffff, 0x1, 0xfa) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"/1216], 0x4bc}, 0x1, 0x0, 0x0, 0x80}, 0x80) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000140)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x8c000, 0x68) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r2}}, './file0\x00'}) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000100)=0x4, 0x4) open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x2, 0x1000002) 09:53:09 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:53:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r2, @ANYBLOB="b1240e9a8500fea6"], 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x6c, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IE={0x3f, 0x2a, [@random={0xdd, 0x39, "a877bba26e288781c2487a9e62453d23c668414bd194d355c418579fa9aa8fa049da65a6072be9521785c5092c57658eefac29eb0000000000"}]}, @NL80211_ATTR_SCAN_SSIDS={0x10, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}]}]}, 0x6c}}, 0x0) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000040)=@mgmt_frame=@beacon={@wo_ht={{}, {}, @device_b, @device_a, @from_mac}, 0x0, @default, 0x1, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x8, [{0x2, 0x1}, {0x4, 0x1}, {0xb, 0x1}, {0x16, 0x1}, {0xc}, {0x12}, {0x18}, {0x24}]}, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}, 0x36) nanosleep(&(0x7f0000000080)={0x0, 0x4c4b40}, &(0x7f00000000c0)) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000340)=@mgmt_frame=@probe_response={@wo_ht={{}, {}, @device_b, @device_a, @from_mac}, 0x0, @default, 0x1, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x8, [{0x2, 0x1}, {0x4, 0x1}, {0xb, 0x1}, {0x16, 0x1}, {0xc}, {0x12}, {0x18}, {0x24}]}, @void, @void, @void, @void, @void, @void}, 0x36) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r4, &(0x7f0000000200)="62079e", 0x3, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000500)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x168, r5, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x5, 0x12}}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x686}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x80000000}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x138, 0x3, 0x0, 0x1, [{0x80, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0x7b, 0x2, "02257c3785fe6b44e76d0f15b0ec2df034422ee8e28f709a8d56ac2a7f5c4a202849709a81c234c63eb65378cef78a46a3664d6745b2442bf776200f721edda65714de28051366c23c328c3ec7cc478dde6bd347375847de87c27455d91185cc96847b8ed6ffd98f1fc7da3bb641b4737112bba8383b58"}}, {0x10, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0x9, 0x2, "6db6a44ca7"}}, {0xa4, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x9e, 0x1, "87e485ee924505d092bd356cbc4db52bd9e23ea7df768eefec81619acd8dd86b8187dfe41f590ef5a1d08efb469fb114ec01500b111673812c1a1f95e62a45d18e3a34e244c50600000000000000e53dab2105fcd23992bac8ded24903e4728d066f8c2f01fdbd97da2850ffa1fb2ba32ea8f3a3106f2fc555f4f79e306d9a723e070b6b4555fd8df567f4780a491db0a7bbd83c81825f7ca739"}}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x4c874}, 0x1) [ 424.575349] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 09:53:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) [ 424.590647] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 424.605189] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 424.933745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 424.938039] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 424.949383] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 437.922323] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 446.590103] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:53:31 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:53:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat(r2, &(0x7f0000000180)='./file1\x00', 0x6800, 0x9c) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r3, 0x507, 0x6, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000280)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="00000000000000002e2f66696c65300020e77759127d509eb81a8f96dd70bf638e73e4add1a40f81dd88c313d19b9b40a92711bd96f93333614e0f164878d456a3730d78e36ff968b5cf51693dd5b9b99be50d9931006d2fe9e0ddea4a536f240822748f58d7a46bf9160b30aa4b332030ebaae36ecfde64c84f3a738528df3629b97c94e6ba6306a4ee6c0a5ce34bf8b1bb7874e8ed4015cd5600000000919352"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r6, 0x0, r4, 0x0, 0x200f5ef, 0x0) openat(r6, &(0x7f0000000000)='./file0\x00', 0xae640, 0x21) 09:53:31 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:53:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020801000470008000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='check=strict']) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x200, 0xc4) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) 09:53:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) 09:53:31 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000200)="62079e", 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x9}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000500100000e000000000000000000000004000000000002000020000020000000d2f4655fd2f4655f0100ffff53ef010001000000d2f4655f000000000000000001000000000000000000800000a4dd9631f2328d4bcd4915a9", 0x65, 0x400}, {&(0x7f0000011700)="00000000000400"/28, 0x1c, 0x444}], 0x0, &(0x7f0000012b00)) 09:53:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f8", 0x16}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000000)) sendto(0xffffffffffffffff, &(0x7f0000000240)="11dd7ead8f48580e9f026fe2deedf70bf42cb524fa259844a9e87b3f72250f8161190823915c59a6a5d5e9e8e9a973849e3d05c392cab47082219ba9ade833d9b0571e1968292b2dfd2f9a1e4b4b10ce1101dacfae3edefd4dbe76a362b74dd3e743446339975a51f065fa1cc698f468a29ee604fc31fefbaedb7dccb3a3bece36714bcfc0e4f61a9d2f69457c5fdc7b437cfd61427f32fd8a22bab5c26f3740536730737e988fcdbad3196e7c7a4d7a58553eb963a3aa", 0xb7, 0x800, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x3, @private=0xa010100}}, 0x80) 09:53:31 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="601c6d6b647f73662a7b3b00088101000240000004f8", 0x16, 0x4}, {0x0, 0x0, 0x1800}], 0x8080, &(0x7f0000000140)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0xffffffff00000000, 0x6, 0x6}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'syztnl2\x00', 0x0, 0x6, 0x1, 0xf5, 0x6, 0x66, @remote, @remote, 0x7800, 0x80, 0x0, 0x2}}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000002c0)={@mcast2, 0x7b, r1}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvfrom(r2, &(0x7f0000000680)=""/4096, 0x1000, 0x40000100, &(0x7f0000000300)=@phonet={0x23, 0x1f, 0x9, 0x8}, 0x80) r3 = signalfd(r0, &(0x7f00000000c0), 0x8) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e24, 0x6, @empty, 0x2}, 0x1c) mount(&(0x7f0000000380)=@filename='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='securityfs\x00', 0x1804a8, &(0x7f0000000440)='syztnl2\x00') [ 447.355815] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 447.357588] EXT4-fs (loop4): Couldn't mount because of unsupported optional features (15480809) [ 447.382308] FAT-fs (loop6): bogus number of FAT sectors [ 447.383666] FAT-fs (loop6): Can't find a valid FAT filesystem 09:53:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:53:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x200, 0x70bd25, 0x9bb, {{}, {}, {0x18, 0x17, {0x1c, 0x3, @l2={'eth', 0x3a, 'team0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x55d}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x80000001}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x1ff}}, './file0\x00'}) 09:53:31 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) [ 447.440943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 447.466471] FAT-fs (loop6): bogus number of FAT sectors [ 447.467883] FAT-fs (loop6): Can't find a valid FAT filesystem 09:53:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00", 0x0, 0x403}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpu.max\x00', 0x2, 0x0) dup3(r4, r3, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f00000000c0)=ANY=[@ANYBLOB="19306a631b5610bae01b4ab402e50000"]) dup3(r2, r1, 0x0) 09:53:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:53:32 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:53:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 447.697620] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 447.731337] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:53:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 447.873095] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 459.427150] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:53:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) 09:53:51 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, &(0x7f0000000000)="3082", 0x10, 0xfffffffffffffffb) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="d03fd738a6e3a1d00b328c6756292df24bae7907a16c1ee0aaf4b33aa8ee", 0x1e}, {&(0x7f0000000100)="57b9dee78533dc0efc67bfc2eb076b67b7855a727dcae1888ae1d2441300587cb4a671ddfb9c6fe483777a47ee7d6f1828f4f9ae837597371e400ff3631dfad0bd426fa694836bbdd01eeaf42765eeeb3b868172ad095fdf9e1210", 0x5b}, {&(0x7f0000000180)="85f7b38c878192790637f5a7f3e7b9a6b6484e2024367ccd698b9d5c4198c0b1b5e5bfab03a0ef27426498746e7e9472593b65c4f3c42e09c8665aa6471f0a25c071f3ce93ebb427878639af59587f4d5afefff214c76669d6", 0x59}, {&(0x7f0000000200)="a4e95976b40c675e5606274e2b6d19ea09588c57ac91398949ea1ab50e6e11d785e1de7c8ec0a8efe3cf51e193fbd4769dfcc263679a4957a8b016a3730a26618bfe1efc1e6d2931c6c5d14907f139d8458c388c504ea7b3597064f1193b473c12939dead63f313a2b70b50103e27687c91d2f07062ace698c5fcda43534a24dfce7585d92ca24ed2f39096b00d67e75bfac7e4e15564bf95094c0217076915c52bdecdc773b4b026421a07843aff4981210bd0d8df1235775b1a37856daaf7f", 0xc0}, {&(0x7f00000002c0)="6d9e9beac14a4b1dc090a783b5261c8b7afe6d3b9bab627b9af0a68c397069a20d6ccc6e0018c797962c13e99327be033b3006fcb1f40fcbc765c5d666a8b8e73c8b93ff6938d39e57773e9fbb62e4ec1c26c6aaffc6", 0x56}, {&(0x7f0000000340)="0a6fac12b50f3ac5c05ae30efad0a0576b3e2ec1bcb516a5c23393f970fedc1265a540bd870345499ba66d8a5949a0c3a0f273c1bec536e9a26526e7adbb061b555923a28b69696f70d3d5d86008f7dcaec7c06b6a10e0409c1b03ceeffd3662956b16b250da394ed84601070f70019eb067c109a325154aa840442b8f9c58ea15f58ab91eae348caa6c0f2ae1d6c89c306dde501e3dc457432ec0a675e2eb8101ce91c7dc2610158941989435714d125cda5129c71125c585c78fe36fcec1b5f8aee892a88a39864abcb0ab423fe5e757c0c5772e97cf90f8a752ef73c6d1f776ca26f9f988188933", 0xe9}], 0x6, &(0x7f00000004c0)=[@dstopts={{0x38, 0x29, 0x37, {0x67, 0x3, '\x00', [@pad1, @calipso={0x7, 0x8, {0x0, 0x0, 0x8, 0x7a1}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @padn={0x1, 0x1, [0x0]}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x87, 0x3, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @pad1, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x68}}], 0x1, 0x4000000) 09:53:51 executing program 7: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x101, 0x408200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x1, 0x8, 0x2, 0x5, 0x0, 0x6}) r1 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xc1, 0x2, 0x0, 0x5, 0x0, 0x0, 0x800, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x20, 0x533d}, 0x240, 0x11b, 0x7, 0x2, 0x4, 0x401, 0x40, 0x0, 0x541, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x6) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000100)) 09:53:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:53:51 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, 0x0, 0x1027) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) ioctl$int_in(r1, 0x5452, &(0x7f00000000c0)=0x10001) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) 09:53:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:53:51 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:53:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x138, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in=@dev, 0x0, 0x2b}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha3-256\x00'}}}]}, 0x138}}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000200)="62079e", 0x3, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, 0x0, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x2}, {0xc, 0x8f, 0x401}, {0xc, 0x90, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0xc, 0x8f, 0x2}, {0xc, 0x90, 0x3f}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4085}, 0x20000000) [ 467.058705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 467.068908] syz-executor.2 (5128) used greatest stack depth: 22688 bytes left [ 467.077041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:53:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54"], 0x28}}, 0x0) 09:53:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:53:51 executing program 7: syz_mount_image$vfat(&(0x7f00000001c0), &(0x7f0000000240)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x10, &(0x7f0000000340)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000280)="af", 0x1, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x2, 0x5c068ff3, 0x100) [ 467.503184] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:53:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) 09:53:51 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:53:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x1c, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x500, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) r2 = getpid() setpriority(0x1, r2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x1f, 0x7, 0x4, 0x81, 0x0, 0x9, 0x0, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xd4f6, 0x1, @perf_config_ext={0x80, 0x1}, 0x44401, 0x7, 0x1cb78d1f, 0x9, 0xfffffffffffffffd, 0x80000001, 0x3, 0x0, 0x8, 0x0, 0x7ff}, r2, 0x7, r1, 0x8) 09:53:51 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:53:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f0000000200)="62079e", 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x2010, r3, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100), 0xe1a, 0x351040) renameat2(r0, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x1) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x20031, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r7 = dup3(r6, r5, 0x0) sendmsg$unix(r7, &(0x7f0000000500)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000040)=[{&(0x7f00000001c0)="61a4c147", 0xa687}], 0x1, 0x0, 0x0, 0x4000840}, 0x0) [ 479.410785] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:54:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0c020000", @ANYRES16=0x0, @ANYBLOB="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"], 0x20c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8080) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x125200, 0x0) write$rfkill(r1, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 09:54:12 executing program 2: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1dc1}) unshare(0x3871b1d78ef7e184) unshare(0x10000) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/llc/socket\x00') pread64(r0, &(0x7f0000001140)=""/68, 0x20001184, 0x1) unshare(0x8000000) pwrite64(r0, &(0x7f0000000180)="5757a591630a2eb37cd4b124f3ae5d341cf6ee1d19dd5c5035892b2e2d16d237962c3db5b064b8b663940fa2d3bc3f147bf27b46800f11975f41584f983437abf6a2b7a4ca736a451bebd68495abfe8a64893e07f5d72c", 0x57, 0xfffffffffffffff7) unshare(0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/cgroup.procs\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) write$binfmt_misc(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="73797a30bca46c9268264c0d7196ece8951191be69b2540a117dff688ba9b040a4b0d27e312363e56576fc03c8d529a035bcfff3cdfb4ae14638b9a11edbbce402d51f401f4e91583088d074e39e2113eef2854ea62827916883758f7036eeaddd76ef2f6a43bc213957188b74b9cc54db25438704026e7970e2e2117a899268a87de44acd358c076623ec10f8eea4de635988428b2ad6d2c0057faf690ad38c9ff47630ef4e11cf5356442eb5df862e96f5c78c620054badba41dd70d8cd0bc5483f606633c04e9c8293a7dbce7179afd07656817bb7d49921c121d954268ef8bbeafabb7b0c150ef5438ddfbfebde1defff67849320f18e8d5eed3fb712bb86564bae7d17be5aafad477ad8431deeee6e74783f2963d43d2d580218840d72703986702e3178793ea97cef1d12fcfcf6dbd7b99eac3d0aa792124c84f019a3ce99870d2fa5e8779dcd75d926deaaa3b22953879454b49e066dad9b45c881203682997a6ccffd62cdd73315cb2b8ee4d97ec219f4d5b2af51e982e3c6d61d25d5a49451b605aaab7771a3b1481580d58f90546de4927a2ae93841489720cd0512e2c6ab6c6871d562201edac5adfd1ca411ab91730038c40bd0055ec5fd06514ae8dd9e7bba88fb5e2165ea128e27cd8c5be"], 0xf3) io_submit(r3, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x0, r2, 0x0, 0x4000}]) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @private}, {0x2, 0x0, @remote}, {0x2, 0xfffd, @dev={0xac, 0x14, 0x14, 0x20}}, 0xec}) unshare(0x24010000) unshare(0x10040000) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x715180, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r4, 0x400454d4, 0x0) 09:54:12 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "a657e2c7442acef2212b2da14dc427ae5b95d230ce5735682a17382fb9b6e75a3a1e2ae3184903e3ff5240edd70011481f93af0671199e5c3d3f36159bd27aba"}, 0x48, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r1, &(0x7f0000002e40)='trusted\x00', &(0x7f0000002e80)={'syz', 0x3}, r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000040)={@id={0x2, 0x0, @a}, 0x21, r1, '\x00', @c}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r3, 0x2, 0x0) 09:54:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54"], 0x28}}, 0x0) 09:54:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) 09:54:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x140) shutdown(0xffffffffffffffff, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000100)=@xdp, &(0x7f0000000180)=0x80) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000001c0)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/147) 09:54:12 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 488.418808] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:12 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$bt_sco(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:54:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54"], 0x28}}, 0x0) 09:54:12 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:54:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:13 executing program 4: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'macvtap0\x00', {0x2, 0x0, @dev}}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80400, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0xfffffffffffffff9}, 0x0, 0xff, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() setpriority(0x1, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xe4, 0x8, 0x7, 0xfb, 0x0, 0xa19, 0x40000, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x6, 0x9}, 0x1, 0x5, 0x9, 0x3, 0x2, 0x8, 0x800, 0x0, 0x0, 0x0, 0x400}, r0, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x45) 09:54:13 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) (fail_nth: 1) [ 488.586255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair(0x1a, 0x1, 0x1, &(0x7f0000005dc0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f0000005e00)=""/170, &(0x7f0000005ec0)=0xaa) r3 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) dup2(r1, r3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 09:54:13 executing program 0: ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x11) sendmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="09e94312b34316dddd9c0db32ec3597e75e4b1706e552294e4fa5e1a38aa904cc9287a828bf7da6d2f189b1f9d9d08f60d8afab2f9100639ad33f32c8d2a8fc7996f", 0x42}, {&(0x7f0000000140)="eb918e49c653511eb04201e1f624ce989b64b53bad5ce63fd238465d5b701088fe6f00f0f73ee6fb998bb9d64b259fd3324ae58a47ef2d6846cf8bdcb8e7f6fc3477bb43501cc7fb2dbdc38f942d57ff63adefd73af68dbf34ee3c8df33273cea40f8534c6a7c57610ae54f41b029decfbac", 0x72}, {&(0x7f00000002c0)="ca114b98d9149038785186af6f1a6903d1113621c54dd3b8dd38d8dcc3e51d9aec662170e6d04e9f30d8a473129867f71c289c3fd762a7c93b8bd26ac10d35324a51d82dcbf396768df9ff06963ca966ca00b80e740e68822769013ec013c75219a0204d5674229164105c43771282c8a1aabffb2390a91af6091d19e117daf4dc6f4fbaa5a3b7720925159284129bbf60b31a9485bfff57499f2104b74ef8c09cd91bb2526f6917a36414e6adab", 0xae}, {&(0x7f00000003c0)="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", 0x1000}], 0x4, 0x0, 0x0, 0x4000014}, 0x11) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001400)={'lo\x00', {0x2, 0x0, @initdev}}) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000380)={0xffffffff, 0x5, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'caif0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10003}], 0x100000, &(0x7f0000012b00)=ANY=[]) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x13, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) sendmsg$inet6(r0, &(0x7f0000001b00)={&(0x7f0000001540)={0xa, 0x4e20, 0x7, @local, 0x5}, 0x1c, &(0x7f00000016c0)=[{&(0x7f0000001580)="19cff86727ed4bb4df8da4d221c09aaded405287904d79e63b3fdcfd8ee6cd0e555c09b58ef30c1bf10d4379fd405d555b477492e7068c5fff5d2d49a3bbf2caecb35e6c911230a6257d94baea95e2ee3f", 0x51}, {&(0x7f0000001600)="3c065beae0f4ce6e9ef1ef0318bad8b6d44eef803fdcaf9d82f5fddbcd3c19998feede352dd5f5ff02dd69cc76a7cb95ebb455aa29f278f2f35c7bd23a778de6d408162cdc764e901624fcc51995c9ac88a6f2d66d9532cb0d5af3ab8f8f49efdd291e1f2bf810f2e587a5483e4d3895e7c480b43dcb9c8ca0fa5e59f4449a7ebb17c2d1169f7060a7c4812e489e14085c9256c51764cab58d4d769a25aa4255312d32ae65c92bd2eacf677d5ef8a130da", 0xb1}], 0x2, &(0x7f0000001700)=[@dontfrag={{0x14, 0x29, 0x3e, 0x9}}, @hopopts={{0xa8, 0x29, 0x36, {0x88, 0x11, '\x00', [@ra={0x5, 0x2, 0x401}, @generic={0xff, 0x23, "9a936c892de30587ebb057eacae27c95c84f16225097f2dd538be5b0c8f54ee29bc9af"}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x50, {0x2, 0x12, 0x7f, 0x4, [0x6, 0x10001, 0x2, 0x2, 0xfffffffffffffffa, 0xf041, 0x100000000, 0x200, 0x30ef]}}, @enc_lim={0x4, 0x1, 0x6}, @enc_lim={0x4, 0x1, 0x5}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x8, 0x6, 0x2, 0x5, 0x0, [@mcast1, @private1, @remote]}}}, @dstopts_2292={{0x170, 0x29, 0x4, {0x3c, 0x2a, '\x00', [@generic={0x6, 0x94, "b9d026e073979368fa7b612d9f35e0b0522b9c1d64b23c1696aac9d69fd673566e35e42c28326aa9f81ad17fb324b1249c4ba94935283a74b9ea3fdfa936d91cd386ab576e8260d934a877628658a3a86d808fff25426f136b8ed48b347e69b9b5b26464aa22033574f49216fce8cd87dbb3e359e0f1d952bd617664edd6444b8e6f37273259f60216f91d70cf774ec6b28e7110"}, @enc_lim={0x4, 0x1, 0x4}, @ra={0x5, 0x2, 0x1}, @generic={0x5, 0xb4, "f93feb202666ce026c290bd634f2dbf6db02172c8df66165a85ac10a9011af985e1459dbc153c9be892bb666475156786320bcaafd7d9183416ba03b86d4b368ae512614b69dc4e702ebe581b1784af70c19c92589e94430379009a17b75752cbbd40129585dd26416cceed0d36ab5cf52cdc03ef07a640a080256571dc188d1b95d65080e9cbd331aa9adcdfc1bb8343f5f472047abe7a3afe9caba66f732f027fea709ebb64c399ce268ac1d7688818da28bd2"}]}}}, @dstopts={{0x90, 0x29, 0x37, {0x21, 0xe, '\x00', [@calipso={0x7, 0x58, {0x0, 0x14, 0x81, 0x3, [0x4, 0x497, 0x8000, 0xff, 0x20, 0x2, 0x9, 0x9d, 0x0, 0x8001]}}, @generic={0xcc, 0xc, "30f0fe35720cf20b0f2cc7f8"}, @jumbo={0xc2, 0x4, 0x9}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x800}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @dstopts={{0xa0, 0x29, 0x37, {0x5c, 0x10, '\x00', [@generic={0xbc, 0x39, "f3abb429ec1f271609720b87aa70b106de915e4c823d7441d3bac0f86f400597ce51cc5ada66d3f9c9c2f807c5919ce51765c220c76e948851"}, @ra={0x5, 0x2, 0x2}, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x1}, @calipso={0x7, 0x38, {0x1, 0xc, 0x1f, 0x1, [0x1, 0x4, 0x2, 0x10001, 0x80000000, 0x7]}}, @ra]}}}, @tclass={{0x14, 0x29, 0x43, 0x65c}}], 0x3f0}, 0x44000) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x2010, r2, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000180)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index=0x1, 0x0, 0x0, 0x1ec000}, 0xcc) syz_io_uring_setup(0x1387, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000040), &(0x7f0000001500)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000080)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000001440)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x3, 0x0, 0x0, 0x0, 0x12345}, 0x800000) 09:54:13 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:54:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310f"], 0x28}}, 0x0) [ 488.694981] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 488.746356] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 488.757937] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 488.760251] ext4 filesystem being mounted at /syzkaller-testdir462435962/syzkaller.IJcSfe/38/file0 supports timestamps until 2038 (0x7fffffff) 09:54:13 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 488.794703] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:13 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 488.830592] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:13 executing program 7: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a000f", 0xf, 0x800}, {&(0x7f0000010500)="ffff3f00000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x4842, 0x87) r1 = open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x25) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2, {0x3, 0x8759}}, './file0\x00'}) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000140)="ee", 0x1, 0x800000}]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x200f5ef, 0x8000000000000) [ 488.863854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310f"], 0x28}}, 0x0) [ 488.950586] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue 09:54:13 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:13 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') lseek(r0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='pagemap\x00', 0x4) fallocate(r1, 0x2, 0x1, 0x3) [ 489.066414] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 489.073092] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310f"], 0x28}}, 0x0) 09:54:13 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ftruncate(r1, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x1830c1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101802, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x12d842, 0x0) signalfd(r2, &(0x7f0000000080)={[0x80]}, 0x8) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000740)) copy_file_range(r6, 0x0, r5, 0x0, 0x200f5ef, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000004c0)={0x3, r2, 0x1f}) [ 489.210394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 489.451858] FAULT_INJECTION: forcing a failure. [ 489.451858] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 489.455342] CPU: 1 PID: 5205 Comm: syz-executor.3 Not tainted 5.10.123 #1 [ 489.456891] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 489.459431] Call Trace: [ 489.460025] dump_stack+0x107/0x163 [ 489.460837] should_fail.cold+0x5/0xa [ 489.461697] __alloc_pages_nodemask+0x182/0x680 [ 489.462745] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 489.464357] alloc_pages_current+0x187/0x280 [ 489.465468] ? lock_page_memcg+0xcd/0x260 [ 489.466520] __get_free_pages+0xc/0xa0 [ 489.467484] __tlb_remove_page_size+0x253/0x420 [ 489.468641] unmap_page_range+0x1190/0x1e90 [ 489.469748] ? vm_normal_page+0x2e0/0x2e0 [ 489.470788] ? lock_downgrade+0x6d0/0x6d0 [ 489.471706] ? uprobe_munmap+0x95/0x560 [ 489.472595] unmap_single_vma+0x198/0x300 [ 489.473520] unmap_vmas+0x16d/0x2f0 [ 489.474336] ? zap_vma_ptes+0x100/0x100 [ 489.475244] exit_mmap+0x27f/0x4e0 [ 489.476035] ? do_munmap+0x40/0x40 [ 489.476854] mmput+0xca/0x340 [ 489.477552] do_exit+0xb42/0x2770 [ 489.478338] ? find_held_lock+0x2c/0x110 [ 489.479337] ? mm_update_next_owner+0x7d0/0x7d0 [ 489.480373] ? get_signal+0x399/0x2200 [ 489.481241] ? lock_downgrade+0x6d0/0x6d0 [ 489.482309] ? do_raw_spin_lock+0x121/0x260 [ 489.483265] ? rwlock_bug.part.0+0x90/0x90 [ 489.484207] do_group_exit+0x125/0x310 [ 489.485072] get_signal+0x469/0x2200 [ 489.485920] arch_do_signal+0x8c/0x1c60 [ 489.486808] ? inode_security+0x107/0x130 [ 489.487712] ? avc_policy_seqno+0x9/0x70 [ 489.488617] ? selinux_file_permission+0x36/0x510 [ 489.489731] ? task_work_add+0xe1/0x2b0 [ 489.490637] ? restore_sigcontext+0x620/0x620 [ 489.491635] ? pidfd_get_pid+0x1b0/0x1b0 [ 489.492544] ? evdev_write+0x410/0x410 [ 489.493418] ? fput_many+0xf6/0x1a0 [ 489.494248] ? ksys_read+0x1a5/0x250 [ 489.495185] exit_to_user_mode_prepare+0xf7/0x160 [ 489.496288] syscall_exit_to_user_mode+0x38/0x230 [ 489.497370] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 489.498557] RIP: 0033:0x7f386f412b19 [ 489.499380] Code: Unable to access opcode bytes at RIP 0x7f386f412aef. [ 489.500917] RSP: 002b:00007f386c988188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 489.502626] RAX: fffffffffffffe00 RBX: 00007f386f525f60 RCX: 00007f386f412b19 [ 489.504227] RDX: 00000000000000f8 RSI: 00000000200000c0 RDI: 0000000000000003 [ 489.505827] RBP: 00007f386c9881d0 R08: 0000000000000000 R09: 0000000000000000 [ 489.507431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 489.509031] R13: 00007ffc0554e8df R14: 00007f386c988300 R15: 0000000000022000 [ 504.291122] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:54:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:54:36 executing program 2: r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x210400, 0x29, 0xa}, 0x18) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xf3) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x4, 0x0, 0xd2100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc21, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0xff, 0x6d, 0x8, 0x0, 0x6, 0x10, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40000002, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x44c74, 0x7fffffff, 0x1, 0xc, 0x8, 0x4, 0x5, 0x0, 0x2, 0x0, 0x80000000}, 0x0, 0x3, r1, 0x8) 09:54:36 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:54:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x8) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x0) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x400100, 0x0) write$binfmt_elf64(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1998], 0x7ce) 09:54:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a0"], 0x28}}, 0x0) 09:54:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=""/102, 0x66) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x1081030000000000) 09:54:36 executing program 7: r0 = getegid() recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = openat(0xffffffffffffffff, 0xfffffffffffffffe, 0x4, 0x80) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000002300), 0x80980, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r6, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r7, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r8, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r9 = syz_io_uring_complete(0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003780)=""/22, 0x16}, {&(0x7f00000037c0)=""/178, 0xb2}, {&(0x7f0000003880)=""/10, 0xa}], 0x3, &(0x7f0000003900)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}, {{&(0x7f00000039c0), 0x6e, &(0x7f0000004c40)=[{&(0x7f0000003a40)=""/4096, 0x1000}, {&(0x7f0000004a40)=""/178, 0xb2}, {&(0x7f0000004b00)=""/251, 0xfb}, {&(0x7f0000004c00)=""/55, 0x37}], 0x4, &(0x7f0000004c80)}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004cc0)=""/185, 0xb9}, {&(0x7f0000004d80)=""/13, 0xd}], 0x2}}], 0x3, 0x0, 0x0) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r10, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000004ec0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) [ 511.946279] __nla_validate_parse: 1 callbacks suppressed [ 511.946292] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 511.950112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004fc0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="566655b533d70ff495a42542b4d5a59ac9f00d6ad74b48084f7c4fa795b5b860739691b74f205e56da269664a300945f3a1969b1282f4b50a1978d3b269623977fd2a1616083eedb6b572a84b19c53e4a75c92683cd0dfb1f39baea08bd1447ff5ec1a98b2b30d19083d91cfddac5532748361e02bc912b746566e342dc43404ddf2d54f1565ef4d830a105d61e4ae9559b2711a699732deebcf355e967c94e565f0ab0f3635424a4ff8c9a7ec7ab41151306b325b568e84f68f3647384fc6a7eed2", 0xc2}, {&(0x7f0000000100)="ba72aa417312e8fde92cb37b4a71ec3e33f5400432b01e3925aac6b5f6df38590a521309ea82ebb8b7081d88ed9c381d91264345fcd8a6bdd705e920e7c10a7bcd8ab2ef4b0c0085037e0dcca5991a004d1b33da687b02e13744672043ed3528d12ef7b02b6ac4a45a45609f7d9fffd5ed302c2730af8d3f8fb0cd967e154aad37335db65b178efded0b54bf4d6b2726343f99e88d74e031a8dde9f82a70e92f014338305c11d12026", 0xa9}], 0x2, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r0}}}], 0xe0, 0x4040000}}, {{&(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000500)="ea915413870e59445449c0b47de6ae48d61982f18a6dfc703a88b65b8e2acb5757d7969283ae21235f677211c1cd2c3ea1a0ebae19b04bc5f99767a93c0655b88eee0f5c98d9cc4d46d2eda5f8fbd34192ed29a48fb45aede23c7102f29c42b390cc3ee1d927b5f77fb8aa56781f7d27d0eb9298c551247d58dec4d0452c13859b28737ef814e838ef710a5fd7d5135ef28f80cbb7f0cf95f1cb4a488112a1d296ab5fd4255c97fc6e768bf2da7b6234e901831766", 0xb5}, {&(0x7f00000005c0)="0f6f52a6b001a9f9aabf40426132797d08aa28b04101afb66fb0450e75a4a55bf0a5f7ce41aac2575bed406d2f4375679d5fa4917f6111480cdf8a342d7f097df51ac34e2527bdb60b2b17582d4590f154b68a8e7e9ebcb2f6137d81869cbe5364bc0c969e5c349449fbc2fc7a3f2d007234a92e", 0x74}], 0x2, &(0x7f0000000880)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, r0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138, 0x4010}}, {{&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000000a40)="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", 0x1000}, {&(0x7f0000001a40)="76793d95f4c4ce1d7d6573e56d4e2c929f4eb7edf9eae91286f72de620c2608c9b00ab765a8230c80c30f0905a85344a00c8ae31a7462db096f504938cc2e360cb529d7b8daf469bfc662f1fb91b0106a9156edc043d3340812883692f8277c1d60af59072634e658117fdc8aa2328705c958c9e4aec6ccc5c51bb3f4c33e635985d2b", 0x83}, {&(0x7f0000001b00)="505a763c1f1450d7495de355e3ce46b15eac6d442d514eba93fb8ce2e528a6945111cc89d165769ee8205c2e956707955de9c1e18451ee2c111c2fd6c88a9fb2b416687862d3adffe7207fd54bce31c20651a3c9129b1c89d37233fb03d52e0b5bd868a2d83db663362bbd5b6aa772adaaf2418d28483396219c7eba67355853d79a1052bc6fe0e302aa66bd13cf40935aaf210a93e8a7ff997a2c533f6235859a02b9df034405ade26cb52ed7e7079403a445ab3cdb8646ad336e0017fcb3470266fec379682ae4653054837403bef8c2ad0ea1735ad03fd0f1b1427ec4b104a807ab465b959ee9e49a81d8ad5c595b", 0xf0}, {&(0x7f0000001c00)="87bb110867fb360387b1cbcb1346e4db256684a59fb702330f494e8910194463df2555e7ef41b3da1140a1354b729eeec86259caea11d7f276f333aa09ca8d03642f2db1160b6c153b7c851a3d4ee53c8eeff6", 0x53}], 0x4, 0x0, 0x0, 0x24050000}}, {{&(0x7f0000001cc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000001d40)="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", 0xfa}], 0x1, &(0x7f0000001ec0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, r0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0, 0x10010}}, {{&(0x7f0000001f80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000022c0)=[{&(0x7f0000002000)="24f804184639b9e0202ca0e97624f9ee48d80bcd9282d44fcfc6423c53e43ee3e74fb45874b62d2e36b46c1cb4ac01a8808e21b0ded90e25e72bd65f6d0c08031e18eab708819d72093b570960b204f2d0d1317997bad3a50927f10fdedc0449bea4a596af3ebf44c883df3ce2de06ae25b4723aacdb888bb2033a58404f19a93cd28a0bdacc8a7bfa9e5716377262bb1c56eacb03c59739afab5e6efaf85d6327f294055e526faa145f7dee69e90a275d4324be0ab90a52563727078e1a1318f281a4045ae6f4faae70370b854897ca0c53ee33a8db19b2249862", 0xdb}, {&(0x7f0000002100)="ce86aee8cec81f4dcf757c46ff0d091cc5a75825784c3cfdede2734381370de33a86769cf22b859e0ebbfbd7fcf323226c6f3ecf4e39a6f9e060bde8571cee8deb850f43691234c12b136ad8e02da8b9fa3e7b31c656fdf4a661074b2a218f7310b68e7b27682aee365ed309c83d2b0066756d7d8608abbc5cf908086e9e2442bb849a8a3b1b11db022868236f6da0db625f78bf3b4406158147d2d928177332314c3a1c1a91e247ec258927f0a0ad34cb2d65e204d093992e619931905b3b6f44dc6db1c68b4406ca7234d387c1fc", 0xcf}, {&(0x7f0000002200)="f2bff648f12d11cbb89fc6e4a8ff78e7db631b46428a977defe6433662783f299cffbc8b6a167cc2aa6c8d6fbe932a1023f829168c2835e094ffd1110c682aeeac3cb48ab8c7a34c511c98143975c6ef7902c1af02937cbd182c63ca905b2a166c2a0e23651ed9253b2e6d468ee8413592d2a0f4c8b6479405eb4b639e3c8a3f3eedb733165e11a20b", 0x89}], 0x3, &(0x7f0000002340)=[@rights={{0x24, 0x1, 0x1, [r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r6, r7, 0xffffffffffffffff, 0xffffffffffffffff, r8]}}], 0x58}}, {{&(0x7f00000023c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000003700)=[{&(0x7f0000002440)="684ce2fc17867b58a1533bc75b0706b0329fbef6bf0be965424769e40fa3cc34f54e2a656e2504562ab4241d743f1e9aab8c9d13cc23", 0x36}, {&(0x7f0000002480)="a0d6e5564c2859143c80bc2fd19e86aecdfd108e31a688ea19b74ab7f6d4dccc1ab0dd6e4bff00e1fddc30882fe12d3f2ff0d32f73b122d3ff5a41629acecf847c1da7384220e9ede3f234baeb2d42ea165a8dd06e1e99d66f84028c98", 0x5d}, {&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000003500)="c41e939c511e280dc007cfbf133f8730d2f9af58a1c88f751129b3", 0x1b}, {&(0x7f0000003540)="060ec5b5d26476cfbf53ee05010d96bf6586ad78724d32b076370b176912a24234ce8ed281af22ed8b9f004d51fe26ec8bef292677b35db2143368628684187aba65459d8023d083b40c7be39f1901688caaa1658bb02a8c34e9ed37c09b967e3de966001f9f77325e7fc9966431d117c6615d5b8bf0d08fa92d159f8a970bc809789cff408322abdd36f28907c826f83a9ceedd3212de2667e32c06fa01bcb6d771d488ab912fcd61d7f96a55de0bd901d01eaaacafa1cbc063e20180479e244bda9331d3592c141aec1530b3d3ed3a7cecc62624773d0706163d2ea57635c1e0c609a428d8641c9e45a49359a4cee703d6396690", 0xf5}, {&(0x7f0000003640)="3ef5de7c8a77e47b94ed3fe7a6e878b689144af9f7fa45bc4adae58dcf2e4a89e3895c5fe587469232bb675dce5a53cdf67b5122d3169b931e1f0ee85d013d952d6d30d177caec6b0ac2c8c5133325bfadc743610668f92141f4670632854d9eac3f71b0edf58a6e7bdf8baf1911476f2e8531762f30925d3fc94d725fba1378199d18037ffdb73f8096a1e77b801bc3bf33471dad1223f64826293c21e389709fb69e14e6a3fe0b28e6b1d737e2d853c6", 0xb1}], 0x6, &(0x7f0000004f00)=[@rights={{0x18, 0x1, 0x1, [r9, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r10, r11, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}], 0x98, 0x4000000}}], 0x6, 0x40881) 09:54:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:54:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a0"], 0x28}}, 0x0) 09:54:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:36 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) 09:54:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="400500001e00210c00000000040000000700000008000e00", @ANYRES32=r1, @ANYBLOB="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"], 0x540}}, 0x24004801) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ftruncate(r2, 0xfff) [ 512.122651] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 512.140064] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a0"], 0x28}}, 0x0) 09:54:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 512.256132] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:36 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000100)) r2 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) [ 512.307646] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 526.901283] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:54:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0x18) 09:54:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:54:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f"], 0x28}}, 0x0) 09:54:59 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000280)='./file0\x00', 0x40004, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000001e00)=ANY=[@ANYRES16=r1, @ANYRES32=r0, @ANYBLOB="54fdf451f6d663247cecac6983ccda10f0b94f00e4ea32f23f33ad11bc6dd4c59724645137952272fed241277cf5a21551fbbdb0b22faf577cca568aa7a44c973491085cc0e5584bd2eb3f7584e319a28f0bf47b263c57fc6e454d0d3a23d39febe940e2b996035c2f90780e42fc42a91a445132e366a1fe24b223ba5a2824dae3a10ca4e8438bab474ed33eef92b9b62ac4f6f1126a573b9e286c5024ce6d71a21daf31c00c6e8341d25bad9f968954e1effe2c6ea90fe93105a4f10e3870e7f47ac2e1f03984d52f28d5975e7abd202d009a4a7159cc6ea6c3a40297fc56bdfb426d8fd33dcb230049f6fcb17ae8a445de8c180c3446aadcbc817958ef363b94726d4ec0f1c724e8b1aa2089185db59c40ebe99b7a5261b83ad28f1de6454fb9258809c5890f4aa6d46157fc560e4319fbd399351c150b500b5464b2d0f500c628704a9c42bddba98b61305c2c7262eac664e1b02a278234a6f7e6c38a5896bdd31e57c4b1e7b482e5a5e490847501a2d1fbad9f5576e1988dd9f4c4b401a75517ca41ffc2abf7dd8c6d581af3a5bc6e7b05e09ce82668b63486f4a38ec23805cb46fa2eb2b19fb7dc745fe3af489d7251af60e59c9d1d4bba7564df21c43b7f9632e70a56b3942c969bdb26b0b436e181589aca762fac7cce7b6fe14d0ec906f370b296bca01e638365a9ccf97766acb28a781676ba545c7edc08ce470253c37b2f9fcd927ea072ba26bca0ad54bd83ff397cfdb4e66fd4e0b535eacfd5ca7c43a39ecf7d625db6ad7b6f2ff1b6d7c8b9d2b210ad4da58f3883e65a6c908e6ea052671d0b611850e9e4a9b5bf6df5f3df3c6436a32c1aa7ffadb5903054199d4f036007ea7f2476859dce4ae70644432656ea31d5a1a00482c9901782c4a9aeb38d688264ed9a45eac46f1737b3d3e97d94bfe41414a6b58d3e9c0871706f12f822aa2c331db77112f56b4cee60ae777b4f2913d042bd943302b1b6df1e8deb808bd3348588875d2d740c683c5155b38dd82e2ab470f8e55e79017d25d566599cdc81bea459d1b820b7befb8c945d9c45e3026b4ce764145596cf000898a0d3fdd759e58819d8048d3ee8765188d4ae711ac52822746e9f9e29d0cb8adf5962740d71ece5a86031b6d0efbabffefd9f14a11d5befaa63f8001ed53b9d977a7cca51cf09cda88f121e0cc1b17e6dd9856b51cc4fc1513fa569f519f0609c2a766c382c9b71379f87f6c09f7cb41806c388389fda594c375f4914bab49037c06acb2f1c744020487565dac6e625c6dea5824cc385986f3ea69a4e773f0d377afc5ac73002a2efbd3117be9bc97bd45b3577d9d3d553b5515e68f8b8f6a5841d8296d214dafb85c4a23a1892352be0c15fe72e2a29ab662014372238c069e4a66d7dcfd8f1d5ab4d8452b794f523e143e15f7c786ae50d0f063f155b4cbdc49a28e33f11b51dec9f4089b4797f48a50af1825ebdf583a5659379f21e093b8d076ae158241bdcb6a0043a7a4f807fc1c0daba0fd8e81b91242fac26b23cc98905f10fc637d9fc0d0ee65daaebcfb304432c06436746c322040eee26db08b3d13055b40b1f5fce62c3f9cb2596c7441e1f2ab0e936e182e10c7f3d2caa6e517f95496627071c3db702e4dbb844ac6b67ff7a3c7e40c9c1e5af81f84b343276b4347ef7e96acfe6b0c0278a430337ad022b5939bffed32ebc97bddfcc4ecc1e9471aa39d7e0be54782cd7fb3642a0fceac744d98103e97c9b89476cca2f15f9d58f74ed4fb18e1646ab0bd9a6396f743dce24013db3ec067b61dac3efbf056692f43b040aa8ab879c7e22fbab624aad6c3c15770c53e1f7da81d2433a6a589ed6918b7c5592427e0a039207855a5a5a914095431083d88bd49cff7e3cf87456e61a5cb63cce7d42ed4a45e66b213ed126264ad4123284c16121637c2daaf36753d741045f29f05f9c26924cd69d2c90887fa26f793442d33c0162239bf020a69e80943822d51b89e313c3502ce76a6d4f1ea9ea8383f7c7a0b00303b0f4e243e5e3cacb0c870d7150f7cd8ebafdb29f5039a0d0c3392c202555291ca43464d3d7799892655b700bcd438d7d7e4902e52457fae3d9b13a0a8cd775ecb6ebd3d7bd549374f5f54309c410ef2132b054dbd77a11c1b1d549fe54ec465951e647a7ee3928ec313f55dcc4ad78985fb83adac1c86b14d7dffc61d9fae71bb3a107cecbeed2e78be74e67bc7dbbead66f96395f3678b9a67e3da89f1f3ab54046c43f01febe641c025884d959efb612321b5599c77ad92fa6b38a52f3895a41b8df036c4e098ae5c84f7060a2aa18f6adf3997245599fc155ad95c52f9f846be0d9b998f261fb949510f873413cdd721c70e167793ba3100af1adae12c0e90269b0f373402e70215d7f04d6870eadef80a8e68712ea0e33524b2f765fe6f469c2b083d0a5edabf023088ee41f214eb26b7882f2012981c846dd51174c80ba28ed9a817a6ebd21ebf5eef20c71b32e3062563ad7379112b4beb629b946093b55652708105671fb2c80bbfabf7b778a5d889349d34873e7ea056d1274818d44e72bd7ce4c6c0242f59534748db0f61e5e539ef1960fc753eb7564eaf103e98519ec696bc8d423c86b35948354aaf9e0efafbb010d26fffb180808d4e5b41dde751899ae4ad5cb8482da2e4f0974ee34bd8c664c4081c615dec7bf2af232e6e5834e4bc92afdc1ae3104d4b898573625dec63b6afa2d36717e6d21e59573bf79d5e67256fcc43077718e4cdef7f4f92b0a413bd719bd1541a2a61ee12639043c58e2e7fcbec8164a3823b2e75508acbc9196533803721567df32f645904742bc3fd312170286394b57e4d0c064db9dada1925aeaa0245841a4e2bd8fa21074632212a63b1ea2029d9ac130062086d4c33808047742b127353458a1e150e8981bbec15b6ac26bdad8425a103a5502ff0b8de910fb264650dbf430a0c04c039cac09312b5b452a84bd482f7e29fbe0251c366ec741e5da96d59db434e8709a034ac73657a93b3512313b6ee5cd815e4d7c97b0f25b76b5eaa3647e3c81e50c57bf2c2fd11ab2f95d074af08fa2d6c45a313a136952fd2d2f7ca7ad1dbc541988ab00a3b7682c6fac73d7d20d766ba3053d69b9925274d6f2fa3f8429d1acf13c0c1e769d5f1d24199ed2804f3ae4ea45a7252348fa09f2167f83d152fae94b7b5a411767d8a0e5b97717f48d179d6a4feb2b656da9fcf02b6a86cc24b4d8afb579903e2a4a5648917ed224c4a0165286cd2bcf947a9f24e79316b0bd64e4cbf92d4d08b035f0e6f0a765077b3d86e88cd51d2f5c17583de6850071374b8737444e6ceceda31f20ac2787d6bc27f9286b8b69e3683bd1e322ad31ff31cc0f606b0292d63d387bfe58376f051c7b815d77d89757d5c25559aef364e72460d25a7f2bf2ae1dfc36a8805a4e0fa234a76e7f3fc879f8e03998f3cab7400eeef674b6f141026755c76117207f913337a8be85517f236b239ec1f3011dd1b3fc2627a4136369b5ab5b7caad8ae5c639fe9459f86e1eafa1f394b742213c1b50cc74a368528ec3926c2c91c09b269b6d5493515a65803c699dc749d51cf4d1a6cded9d54a1962d6ec171dd6c0dd4646fa9b4b06b13dc0b59bd8a3278873cb50cfe25129a08b40103720bd050dcd1aed1646cbc7b7f66453e858a3cd46af12c30cd3d921904732973c4a4e8277cc432e761e994e47d5a6384487efe0100225835eba53130cafc2250d1e8e72c5bda66354dfb59b8aa49574d7faac0579be43c9548386d5b989bf8c0a1bf73affdcfc03e3222dc54297cd87605746e3d65c4d1b301eb76aa5851854ec10d9583fcd54ed181f21d0fb1cc5c0af84468a1301a5ae69a670ff6b2b15f909d7d3aa649b211b7a327ed0e048759af019414a2c36fcd9fb4fdca1163bcc8d5e9e7653bf13a3638cd1217c7199923f3654f145c4b6cf260befd1e015490f6cf30989e77524ddc4860fe4163e03abb54bc2091815450717f2ebd8572427db1fd3c0f142fa09c20635b927f84fc3d33b1929373d89df1f15d661c12509ce5e3df3ce121be53b3d29617723c44df5b5dc932d75b80943f1f80625d412de85fff08e8d196eb335c7c59ab040213edb443cc431052189767b0a4720d8e3e99255ca65bdeb536b8039814f3d105bf2e9e5d6e447027c3b7013478a1a667c322e8470a680036e6bad197514588a43d389ee5426d033868a3fff21fc788b2462d259fe3baedd7efa181d202fc71d4897c200d84e6286c60e4cc082edd5b2a9c38f6672d1999a9b983bd830806acf1b698f33acc6f791400b0021915a008713bd7400e706986b11c556e907cec974235f39b5330ab4fd8a0546d8d9ebadb4f77aa7b95710c86de1c771a9a601388b5e390e22fb591f351355bbbecfcd80efad213cfcfafde24640eff295f45e0b76677d0c95f81a676c63eb3255a9073b4c6eddb0cca1f3b10336964f8aeb93512b85509e3b9bc932b5a1e17f8696a7ebdae0ad7fec7b5d823712efa463915013e78fd94ee53e23098b31037d444655285fa0a32480222032ca79497e9e89662468ae51d867c9f8956114709131782f686b96f296aefb72b443f94330a35400b21415c8f74730f8e8b4563c3ee171a3b69cd7d1564e0bf3469c85a20a4fa3a41b9bf4409017c6ca177d71f8e656094e38d474a181e420bd9f4fd10e5fed3ab07bd083308334b06c4d237e136a0453ad3fc9e04e7532be0add5e61262761530c697e943ff042a97152129917c34aa4f6ded9a29a059c8199cf72f426f81f4ba0effc6046b47b334eef270bf6bf19a1e330eb8bb18d798801a34fe188c8f7dbb8eb528b7189651764fcca187c9d677dd76ba950ad2bbe0e5bba74afaba486bb50cfe429a381ba06a594bfc0f20eb93af21239f15e388cd90c3525706c40a7a6be79edac965900144f96ebd3bd3b76a5af3a37473351c8f657120415493857cb296f8aaa7237d2732d77d6cd6fbe3bea74d995fea71ec2adeee33b20d776bf30afb4118ec0b62c3352f5c3d8f6b652dabd0b97cd23c501bd47ce85e91e115b6b61d87ba8fe8fd50af0f125d9110e80eab23c9f335689816f5e49cb1d97308a341aca8760a34f4d802191a46cade7a94f28be134124a66313430bedaad5f0f4cb0fc5fa4231ceb262782b107ef4488a794b2803bad4469b82cbba01ec62e0c6e76a58534bc466c0833dff2e552860a2e2896ce3cc332be175dfd1dd918a254368b663cae25ed027172e90cec96a6a73543b3f7d0665a07cb8e8ecd5aeb387021845697ab7fdf330a641789910a3c2eaafe10ae7cb5d62fbf3c652cc812247260af7dbc087e56fec92280cb4e595cfceffb7034f37295eb330f5648ac571d34f8bfe5b696f4c8d5ce6b67a153f9e1bbd15590e54b5b241d94d651c6e0c56953fb8ff26bae9a58a8efa53a9e2f67a4f898ad3cd6f6f3ead8b48bf34ea690ab462819dc651682b9dba7a58139f085b78a22eeab6a258b6f25a40c7be174777fd8a4d6ac3b353d23b6c2d2bc17ce5912cf94204e33a9bc416ee6f02c8fc1edde2823af51cab333d08f607cfef391457663474263338a2c0f624cb619c60557c8ab4ae4c070122bc75d452c7f16bf555d5ca39478f0564e8fb52c0e7a185f5c28ab5144437a0c4bae1d3cba810f7cc6ecc29e54931f52b45777c324a905921d99a9da29b33965955c27a5ff0906b481e89c5fe76a02b6eb3a37d484c9cbb5f8a1c8b1fce9b2df3b8e46558c4b4247cd42b0d429e374cae94dcf10e77465c06090d3c25d9ddc7a7d866681bdcea817f45c27b8e47015a27459ed65a33c4f986ee4ba95e9333777e1ba951e2fb45620fe325ad368a960dfdc9d848590291d719d4f8b4fbb1aa9bf7ec975b1b808c382b9a20df6028a20d2c5e"]) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x109000, 0xb6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f0000000140)) write$cgroup_freezer_state(r2, &(0x7f0000000180)='FROZEN\x00', 0x7) 09:54:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 534.730010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. write$binfmt_script(r1, &(0x7f0000000680)={'#! ', './file1', [{0x20, '/dev/md0\x00'}, {0x20, '/dev/md0\x00'}], 0xa, "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"}, 0x101f) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fstat(r1, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff}}, './file1\x00'}) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r2, 0x80047210, &(0x7f0000000300)) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x50, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x4, 0x2007, @fd, 0xc92, &(0x7f0000000240)=[{&(0x7f0000000140)="73f4c9482ffd15501f7f7418a5c7e629be425b59ff81b51ae2d04aef74a7a65a3ae0", 0x22}, {&(0x7f0000000180)="5c677c3db5e09c3301c2fbec8cfcd6986bab5a718e63accbf31890edaea0ce7cdf1eb48c3a82d3ebb317a6db54ad4095a75c0120b4eecc22332b94b1df2279ed240c2433656ad520a91076aa154aa0afea9b7a7a374c754f06b116ac64e8863c2dd805a0ea087b5daeaa3d27875055835cf691a64d51f5f1e8465b37e1e6d6c4624d0391cb49ea02a4278bf8a0062e2a9513a30fb29e77643d6ed3c4b28d6f2c16efa3f20cf881", 0xa7}], 0x2, 0x4, 0x1, {0x2, r4}}, 0xfff) mount(&(0x7f0000000000)=@md0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x209000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(0xffffffffffffffff, 0x5381) 09:54:59 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000100)) r2 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) 09:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x320) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000200)=0x140, 0x4) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x4, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @remote, 0xffffded6}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) 09:54:59 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 534.737169] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f"], 0x28}}, 0x0) 09:54:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 534.800497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 534.828178] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 09:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x320) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000200)=0x140, 0x4) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x4, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @remote, 0xffffded6}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) 09:54:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f"], 0x28}}, 0x0) [ 534.862565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 534.961996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x320) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000200)=0x140, 0x4) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x4, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @remote, 0xffffded6}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) [ 535.004490] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:54:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x320) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000200)=0x140, 0x4) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x4, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x8000, @remote, 0xffffded6}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) 09:54:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 535.550847] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 550.090673] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 558.341976] FAULT_INJECTION: forcing a failure. [ 558.341976] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 558.343801] CPU: 0 PID: 5400 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 558.344971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 558.346686] Call Trace: [ 558.347089] dump_stack+0x107/0x163 [ 558.347623] should_fail.cold+0x5/0xa [ 558.348175] _copy_from_user+0x2e/0x1b0 [ 558.348737] __copy_msghdr_from_user+0x91/0x4b0 [ 558.349490] ? __ia32_sys_shutdown+0x70/0x70 [ 558.350197] ? perf_trace_lock+0xac/0x490 [ 558.350876] ? __lock_acquire+0xbb1/0x5b00 [ 558.351638] sendmsg_copy_msghdr+0xa1/0x160 [ 558.352341] ? __ia32_sys_recvmmsg+0x260/0x260 [ 558.353043] ? perf_trace_lock+0xac/0x490 [ 558.353708] ? SOFTIRQ_verbose+0x10/0x10 09:55:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0x200001b8) 09:55:22 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x82) write$tun(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="000000f6dfd90b"], 0x7) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) shutdown(r2, 0x1) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) r3 = fsmount(r2, 0x1, 0x96) sendmsg$nl_netfilter(r3, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xe0, 0x2, 0xa, 0x801, 0x70bd25, 0x25dfdbfd, {0xa, 0x0, 0x2}, [@generic="ecde7316f661ead2a662a49cca5b74bfdf0846928c48aca1357ea69ae85d0a30c54b79fbb5271fa7841cea545567fb25e91b6a8a60a360c1fd9a646b799d63a02fe27084a403101d0047af462144f6674b998a8bf2769cc26886f632b5b2152562b5f93b24e1a11d774ba9bb10ba0fb0bb150f1147b83e8c93f5cf11d72d73ff5a249b07622a64555220268a3830a09eb7822ece18c683530df9b7bf8c9b54e3f9beaa19879a18c8eab87357b99da4b63e482d501a1e7e", @nested={0x13, 0x5a, 0x0, 0x1, [@typed={0xc, 0x32, 0x0, 0x0, @u64=0x9}, @generic="391650"]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x800}, 0xc000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x5e) creat(&(0x7f00000000c0)='./file0\x00', 0x113) copy_file_range(r5, 0x0, r4, 0x0, 0x200f5ef, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r6, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) lseek(r6, 0x6, 0x0) 09:55:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 1) 09:55:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) [ 558.354547] ? __lockdep_reset_lock+0x180/0x180 [ 558.355893] ? perf_trace_lock+0xac/0x490 [ 558.356573] ? SOFTIRQ_verbose+0x10/0x10 [ 558.357382] ___sys_sendmsg+0xc6/0x170 [ 558.358006] ? sendmsg_copy_msghdr+0x160/0x160 [ 558.358802] ? __fget_files+0x26d/0x480 [ 558.359480] ? lock_downgrade+0x6d0/0x6d0 [ 558.360147] ? find_held_lock+0x2c/0x110 [ 558.360796] ? __fget_files+0x296/0x480 [ 558.361454] ? __fget_light+0xea/0x280 [ 558.362108] __sys_sendmsg+0xe5/0x1b0 [ 558.362723] ? __sys_sendmsg_sock+0xb0/0xb0 [ 558.363492] ? rcu_read_lock_any_held+0x69/0x90 [ 558.364292] ? fput_many+0x2f/0x1a0 [ 558.364855] ? ksys_write+0x1a5/0x250 [ 558.365447] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 558.366259] ? syscall_enter_from_user_mode+0x1d/0x50 [ 558.367071] ? trace_hardirqs_on+0x5b/0x180 [ 558.367762] do_syscall_64+0x33/0x40 [ 558.368445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 558.369297] RIP: 0033:0x7f406e572b19 [ 558.369874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.373237] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 558.374363] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 558.375398] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 558.376406] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 558.377409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.378459] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 558.380034] hpet: Lost 1 RTC interrupts 09:55:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) fcntl$setstatus(r2, 0x4, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 09:55:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:55:22 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x28020600) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) 09:55:22 executing program 4: socket$inet(0x2, 0x4, 0xffffffff) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) fork() 09:55:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x9, 0x1, 0x1, 0x1d, 0x0, 0x1ff, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2b2, 0x4, @perf_config_ext={0x1, 0x7ff}, 0x18, 0x29, 0x4, 0x0, 0x9, 0xcee8, 0x6633, 0x0, 0x2, 0x0, 0x4}, 0x0, 0xee, r0, 0x2) fcntl$setstatus(r1, 0x4, 0x6800) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x0, [0xcb6583b6, 0x1f]}, &(0x7f0000000080)=0x44) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:55:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b000000800000000800000052470000620100000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e35393734373637303400"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000026acba7564fc4e5aa2fa9146860a2012010000000c00000000000000def4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="01000000000005000c0000000000000000000000040000004b00000000000000", 0x20, 0x560}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000120000002200000060000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010500)="ffff0f00ff0f00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x880, 0x1000}, {&(0x7f0000010e00)="0b0000000c0001022e00000002000000f40702022e2e00"/32, 0x20, 0x2000}, {&(0x7f0000010f00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x2800}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x3000}, {&(0x7f0000011100)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x3800}, {&(0x7f0000011200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x4000}, {&(0x7f0000011300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x4800}, {&(0x7f0000011400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5000}, {&(0x7f0000011500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x5800}, {&(0x7f0000011600)="504d4d00504d4dffdef4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x6800}, {&(0x7f0000011800)="0200"/32, 0x20, 0x6c00}, {&(0x7f0000011900)="0300"/32, 0x20, 0x7000}, {&(0x7f0000011a00)="0400"/32, 0x20, 0x7400}, {&(0x7f0000011b00)="0500"/32, 0x20, 0x7800}, {&(0x7f0000011c00)="00000000000000000100000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000009800"/96, 0x60, 0x7c00}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x8000}, {&(0x7f0000011e00)="0200"/32, 0x20, 0x8400}, {&(0x7f0000011f00)="0300"/32, 0x20, 0x8800}, {&(0x7f0000012000)="0400"/32, 0x20, 0x8c00}, {&(0x7f0000012100)="ffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0500"/2080, 0x820, 0x9000}, {&(0x7f0000012a00)="00000000000000000100000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000009800"/96, 0x60, 0x9c00}, {&(0x7f0000012b00)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d807050766696c653100"/64, 0x40, 0x10000}, {&(0x7f0000012c00)="000002ea0100000001000000270f240c000000000000000000000000000000000601f8070000000006000000779b539778617474723100000601f00700000000060000007498539778617474723200"/96, 0x60, 0x10800}, {&(0x7f0000012d00)="00000000000000000000000000000000786174747232000078617474723100000000000000000000def4655fdef4655fdef4655f00"/64, 0x40, 0x10fe0}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f00000000000004000400000000000800050000000af301000400000000000000000000000100000003000000", 0x40, 0x11080}, {&(0x7f0000012f00)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d000000", 0x40, 0x11100}, {&(0x7f0000013000)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af30200040000000000000000000000020000001000000002000000010000001300"/96, 0x60, 0x11180}, {&(0x7f0000013100)="c041000000400000def4655fdef4655fdef4655f00000000000002002000000000000800000000000af301000400000000000000000000000800000004000000", 0x40, 0x11500}, {&(0x7f0000013200)="ed41000000080000def4655fdef4655fdef4655f00000000000002000400000000000800030000000af3010004000000000000000000000001000000200000000000000000000000000000000000000000000000000000000000000000000000000000006038208e000000000000000000000000000000000000000000000000ed8100001a040000def4655fdef4655fdef4655f00000000000001000400000000000800010000000af301000400000000000000000000000100000024000000000000000000000000000000000000000000000000000000000000000000000000000000df03f451000000000000000000000000000000000000000000000000ffa1000026000000def4655fdef4655fdef4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3539373437363730342f66696c65302f66696c65300000000000000000000000000000000000000000000077da14d0000000000000000000000000000000000000000000000000ed8100000a000000def4655fdef4655fdef4655f00000000000001000800000000000800010000000af301000400000000000000000000000100000025000000000000000000000000000000000000000000000000000000000000000000000000000000d75d3bef210000000000000000000000000000000000000000000000ed81000028230000def4655fdef4655fdef4655f00000000000002001400000000000800010000000af30100040000000000000000000000050000002600000000000000000000000000000000000000000000000000000000000000000000000000000009541ef4000000000000000000000000000000000000000000000000ed81000064000000def4655fdef4655fdef4655f00000000000001000400000000000800010000000af30100040000000000000000000000010000002b000000000000000000000000000000000000000000000000000000000000000000000000000000f3d82c1b00"/768, 0x300, 0x11580}, {&(0x7f0000013500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x12000}, {&(0x7f0000013a00)='syzkallers\x00'/32, 0x20, 0x12800}, {&(0x7f0000013b00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x15800}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0034b4943d9c7dba910612184d09a71b7bfaba3178e682827b7d260f7ea19394359d4d4431cd22f56e62f27b6241838a3edabb"]) 09:55:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52"], 0x28}}, 0x0) 09:55:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 2) 09:55:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x7f, 0x0, 0x0, 0x5, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fork() r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) chdir(&(0x7f0000000180)='./file0/file0\x00') socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x0, 0x0, 0x2000024, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303038b03030313737372c002219f0c50e15989916ea01db271643ec03d1fb2874b80f73473496c356019f9599edd31d62d4a0e45a5bbe44a902e2d54e0a76f8684e3f6b4e43436ed756443b1563254a77dd4c43770715e96b3b629c8ba5764ee2d2b3b2294ad1a0b6d11e8f92952879eaac8763b6b2"]) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffc}], 0x2, 0x40010120, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in, @in6}}, {{@in6}}}, &(0x7f0000000080)=0xe8) 09:55:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) [ 558.566045] FAULT_INJECTION: forcing a failure. [ 558.566045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.568136] CPU: 0 PID: 5424 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 558.569249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 558.570965] Call Trace: [ 558.571414] dump_stack+0x107/0x163 [ 558.571967] should_fail.cold+0x5/0xa [ 558.572591] _copy_from_user+0x2e/0x1b0 [ 558.573249] iovec_from_user+0x139/0x3f0 [ 558.573946] __import_iovec+0x67/0x590 [ 558.574555] ? __ia32_sys_shutdown+0x70/0x70 [ 558.575365] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 558.576200] import_iovec+0x83/0xb0 [ 558.576783] sendmsg_copy_msghdr+0x12d/0x160 [ 558.577466] ? __ia32_sys_recvmmsg+0x260/0x260 [ 558.578190] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 558.579003] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 558.579834] ? SOFTIRQ_verbose+0x10/0x10 [ 558.580472] ___sys_sendmsg+0xc6/0x170 [ 558.581096] ? sendmsg_copy_msghdr+0x160/0x160 [ 558.581828] ? __fget_files+0x26d/0x480 [ 558.582446] ? lock_downgrade+0x6d0/0x6d0 [ 558.583099] ? find_held_lock+0x2c/0x110 [ 558.583758] ? __fget_files+0x296/0x480 [ 558.584436] ? __fget_light+0xea/0x280 [ 558.585034] __sys_sendmsg+0xe5/0x1b0 [ 558.585709] ? __sys_sendmsg_sock+0xb0/0xb0 [ 558.586436] ? rcu_read_lock_any_held+0x69/0x90 [ 558.587190] ? fput_many+0x2f/0x1a0 [ 558.587770] ? ksys_write+0x1a5/0x250 [ 558.588356] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 558.589267] ? syscall_enter_from_user_mode+0x1d/0x50 [ 558.590155] ? trace_hardirqs_on+0x5b/0x180 [ 558.590818] do_syscall_64+0x33/0x40 [ 558.591471] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 558.592259] RIP: 0033:0x7f406e572b19 [ 558.592986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 558.595961] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 558.597237] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 558.598415] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 558.599664] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 558.600783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.601877] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 558.603297] hpet: Lost 1 RTC interrupts [ 558.616367] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 558.621446] ext4 filesystem being mounted at /syzkaller-testdir462435962/syzkaller.IJcSfe/44/file0 supports timestamps until 2038 (0x7fffffff) 09:55:23 executing program 4: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000080)) syz_emit_ethernet(0x1367, &(0x7f0000000280)={@random="41e2a7f6d9ca", @remote, @void, {@mpls_uc={0x8847, {[{0x3}], @ipv6=@dccp_packet={0x3, 0x6, "d57f8b", 0x132d, 0x21, 0xff, @empty, @remote, {[@dstopts={0x1, 0x3, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @broadcast}}, @pad1, @enc_lim={0x4, 0x1, 0x8}]}, @routing={0x0, 0x4, 0x1, 0x0, 0x0, [@mcast2, @private0]}, @dstopts={0x0, 0xa, '\x00', [@padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0xf801}, @jumbo={0xc2, 0x4, 0x401}, @calipso={0x7, 0x28, {0x2, 0x8, 0xfd, 0xfffd, [0xfff, 0x9, 0xfffffffffffffe01, 0x800]}}, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xd5e7}, @hao={0xc9, 0x10, @empty}]}, @hopopts={0x1, 0x222, '\x00', [@generic={0x5, 0x9a, "7bde9fd906e35b86996cd84f76b47f4ffdf0751bb1d70886ee5c95120658c1fa2a015bd63bbcf23c421fbc5a42a6081c0fd6e6539e13229a64cedc67538eb3cf8f5681604db2874968add3e9c5e14e7ceb0f76d28223f3f5a02e19cb07e28e6688c4ca472369962ba5cb9b39bc0df83d355c3570ca52158cc4aecd444d9210f62acb305e4fa58c809ce17107d5c7d7eabb5c43aced1e1d8cecd2"}, @generic={0x73, 0x67, "3eec440b376efb5db5f599293242e7fe5f7ec52a60872488cdba7fe134685a74bea747280ea95f14916e6332131458c0144e15b619e2b7d23b95f2c78cea88b128c8c09f6f04d9e945e035c98fa7217d9b6801a2b0e0abd2fc2bb5b7db9399a02a7d4bc050164a"}, @enc_lim, @jumbo={0xc2, 0x4, 0x4}, @enc_lim={0x4, 0x1, 0xd1}, @pad1, @generic={0x4, 0x1000, "acb156f3af338971683f0c8c0d1948ce1082c9916b6f372db09326ac26136d362746a6a0efc7be3735c206f1e854d4a779d68467d8964d7cfc6bea3a836952310600bdf9c36f1207cdf98c7f2e33ce667d92c41bc89ecf5a04c4103833e9c173bd9f687cbbe0e4ed4c3d2739c0f2d32dbca9e28ef26745cef9aac9529e25e8ceb302260eea33d3188a8bbc37b22ecb51018a865014753fb54bf2eee10f745a7ffb3f4103b443c75ce25c0d3d029a4b6433e5a065480336049ea7f05f2fb6c42b5cd2d418387633b389105473d2c12d5d079189cb2237617f0da5d5147720319b24fb2a8ee2ca73e8aea783f48a74e4cf35e3314ec2f535184661a75bfc7bcb2564f3c46007fc3c0b20b20fec75bdd733d5afe7b12298bce6c4998b35893c7ca86e1b0bb0a60297ae651b70ef1e0cc85614d00711b289429cd60ec8ea4c6fee4180c94c39e727933ef2171cc2430958aec7190715bbbe991462a33449716b75ee23d7d46a24e4ada6415862235ace4e8f4f25f2f6308a703a6ead8ad9c0095b8001a56fc3dd6e525444cb2ded4594c517e87f09099c51bc98e3d2af26cdddd496ed3b46934952aa9ceabbbc40f69c38084d3f8cd314ab6e938c41acb2ca82362cd63abb673d33be93484a940f7cbca397b32f039816d1757486d277926016cd64cc02ee3ec1bb6094c2f5a335933c4a91234984f84861aba850081c419bd29df27895f8c3bd2527482c9e21bba91232e4081cc500f5fac3c9f5a96438b4365c4738af992d9258614b8de516269d8ade2c8819ed08dc5cb97341ffbb9b6d69cd196c5e585522815e9b12c209d92d3cde9eaab5d94ae7855e0d5ee6352bccda4f045f1e0cb648442f02546e304162ba3a8570ed6940da5b125e3967058936c70476d6f6c5e1beefc1a6fd749e732e95b1d457860d475a2aea4fc02f06b05697c6cc18a578cd78ae5889916f51dd599c435129b2560e3118adaf60faf3f02ab810f6a8b5bb48b4f898bad1b37b6ca59db0f2d5b8c9adcf8201b73d119d3334658b5799da3deecbe9ea0000420929c12b68ceee535303b30070ab86b1d6b3a9eebc46d0654c383c10bd8e045e461edce637d0d818fb41c6f32ac6f01dfe51716e3d8eb6dc34fe7629ad4dda491c36f9e19463d8c17bbb64f3d86ff063fa8d47ce260328b3a7cfd25044681bc4f3450f513902fd9dac1a4b579aa4fcb91d0654f96143916f15e04724907fc06ed2abe9a40e24b446cf2f4e042af39cdfa4b97ddf62a8a17b9e0f4272097879aa562496fe1e1846dd07786b018c98b5c55feae21dd6329ea3bff46fee69dc67ddf249b9ae468de51fbb338b12c3ba2dc6b9c348ce8a6629fd1d7bf3dfbfee08c31d4dbe7848601c9aacecd2253306685b8d3c76001eb297457ca71c22d746826bffe2c7fa7c73d6a3e3d93f8781cdd2af68d60795c2550935e69c565e9d5b6743f1cd4fe2f709855d3860e4aaa34ad0b11110a112120d0b9380387484877211852d7a0e1505f1bdba754ad0ec9e331f51dc7d4dc6466066c6003c77c5879a6593988dca9160494cacabf0317ef9957137068e17ad43b198f561693f73a0c7421e75c71986dd695f576f0bdb0bed862824a787e145eb46d44d746187b050b8d8b20641445c0beac28e847a6bfce54b773545c38e63188a779e332afac99c9e5abf9e8d27c0bb81e777eea679cefbc7c39c09bf2408b3a5abf2d50478ba1517295e071b7d8254fb53923df7d6063df8560e4c5415c3ee1e56e27c6bdb94cb307b06cfbcd227d57538a48dd7d207719776891c567a8dc794184f705c889711133d248dc1734be6eb08604318b5030efd555a341b8560d99fbf41a5ed587c6574fe4c1db6ae5204e8c6d4414fbb763bc584aeb861e0996c9ecbfba84034bbed9e76287b9da9b59535b3b9cab33de8710e4b3b47417c86d730af99e5e700ef0dfdf3b756e2744f7d1cca9436275d693990e4416fe735561594469356e6358858c7d0455aa06976a9c3084f08d8555f20401bd3404d106a60349d6a5e57cbaf64000f6a7a5515c766152823b87e81946d995878c6f38688044df0fd5835cb0a4dbb369648f263332d68ec7b222409a3aeb1f7cd1885fadf2bf576f1a17f69e07eb7a3ac32e35333dc35fc5e5ae86c672c81f6daf1b1d9a8597319f799fcc53be4d87568d3d604c01badb4d482fc6e4c513fd9f6e7d690fdb110e825db37f774f216c173a8f294cdc0f53a6b2d78128c83cdd08b8893b7cc049c2e437c5d7193bcbe3083917f5c5d0c4242aed5e7c8b689bf4edfff83326b0b9e6a9a552012da43d8523d099623738f5d8de8f9c992a339ddaf05c8f8f4875c88af4accababe4dc4a1611bb7dfc3a48d34ebbde27d2d3bc7719acc3a867afd70f8a088c7f9eddfa85d4b4600adf70b4ace1495a8fd5c445d63815f892025978ff0b898df8f2215bb0b7cd40df7a63f163a45f093340b89176dfdd1d2a374f7a02b560dda9d5595b8664fd0f5ce206caee84fb6c0d7c4e2bf5ece870c0466bbe53d42f8854b10806874095681872942941eb079e12cbc103a7757e27f8dfb866c69f89d8fbb784647b9de1126459e4f805a2261db23e356d48240dc7bdb683eb16d7b6d7090cdebcfed39f475abb8c413c41bb1a4e64e22b33474cd90b0d24f22591b30b5d7ed9c9c6e3dba172ce195713feaeb20a2320d8993386598ef7fc124e9e33d55246f7183729ccbc764af970235df09a8822e7a960f9ce739c1768d913cef7fc12e2bf7233a095496c5dfce58ac854bcc9670fec46c11bf5dc91b7a16345c7315b7ee3c2388d8ef86de27f75429342b1ea622bb240f126b475368ff838f7fb453ebc988061bc3a7e87a0e0128251be393309f59a7759a44b20c7423b6858e25238bde04f3b60673d8587ad81e7778cae09e81fa15e000789eea076e21a3f433c691d197c393ebd708a2b0c215242c1aee19e65365b48b5670d4484da6ff744a68792bcec10f457f11af192b8e774319e4370395fb3d9c451210315ff5b33dab8e08949bba09b1b22decc28d1a6f914af7aa9d019a3bdcbb1317080294039dae6aa7f1637990cdb79ee5cb7f24cbaccabe8dec9c5e9c3b26073434e969e67d94e0c1bdfa6d9e48a4ed0f923ab1cc2a3dec4c96b7fc1129f187cd7689b4f251d74cea4abe83e84cab2195021142f4b3f91c3ffb8c1713e5686edf53e08248d5fed5dce3e76c852ada4b0b07e6347f3d522181279109a0e7fe2e53777f09d8add3ed710047a6f2bbaaf2a907bee1cb1b37128fd02b6875159fa3fde00ac8c710485a02a44d0592c40e6035292da867949777d22ae8f5c165ce7a8d9a50ed6b31f6b833bfaec9a59581249140f735e6a635122d6beb2d9f965173786afe68c17fc85504c76c1a04941ddc4b62d57ea62d1ed83a18cf1301ec213019732ee7030d20f66fe0d4cb685d02f0a166885cc66578c24dfed5e5ca7d499307148cdc90392d5b8c69bc899890b0c1c00858ad75a8127b2ef4612ee26bd955bf4eb483dcfcd015d9e9232639db312e6962f7c9afed82898ef7c441bc5de59aa16626fb3622192d7bb17f0eb3efacdd0e76662661528e81044779e6f96c54abb198992323eefe804d885acb02f58eb40e21c02b8f247a7a6e7fc4a3b8b219740e131de34e4e20ef00bc03b441649c6dcbf53423fce22eee7ccdd84c280e0b61c934acad182bf883416a20f4c9794e38889ec276095ed527478d571453fa478d98c4f77cb41bd9c0e0325fa124136ea9ee407975d19c5066e70eed5c2a8d22f7d3b9847972e9f3b0a9d1dc52fee8e4d3e0eb8853132deb4aecc3469946cecdd748ff1d87d100cde1ee1ccfd53b398ef8ac22a3042fba2d545f2264fa25eda2c1031ffe0bdb21362b1fbaae6ad09489c6283c59242517f47ab2eb736f02e4ee58267c06fb674e482a8ae261651f73fccb56108ae2a7f0d0970a18001b39d9f6e101f7d05c940633403efea5182fae49643dfc5a554d51cb4b1705846be4f48d4c3a97d6c28d667154b51d03bce053e3ae761f6612a7475a60ea8cc31799a9d37bc1bc878d09fbc7fbc2542a5d6702491669bf691bea7a4d89aad263d1ecb7a7a1a00798ab23ed3c56378f3459d00efcf09547b6c297fb2e59910baad4b6b3b76c99e909408619f6631b3414701028ed58110151fc1e0a61d5db92c7adc8bd53727e41d8f38519d62efa8b8cfc3ed7e36f184025043e1612eb4dd93a5f6b8cad0763aa9b7473f81f222bcb3c798e33b9fe23d89ea438fa096033dedda05701c4a34947236c21461e646b97a6dbbc05e59fcebec8cd60e000862950d82bd25916f3dfd2fd2b1bc54c5cf0c69198abfaabb6e96a9555f4b6816234a01d9774090408a2f27027422d77a5244a2bbe372612f6bf226186a00feff04c896eb01ad5ee8514ad1a9c34b064c612698b77074676e1e227e2e8ef887ccc434c4b23b9cbae0abef2d29cfae8fa9b01f59d66d76b7ba5c3602317cf9e57aac60c32ed0be9830b13b33af500c8ea3f1594bfec3953218351de1d0632a5086320e3703c8e2b9ab69ccdae7a18169da3300c97911716e5ec1140c7d2426a411dbc51afe0e676557c241fbce91007d7032dad7a6e62da369b47dd106d10c45f0631192756f6a13b8da7b852019e2caaa3321021cc993be5b59ec19a368a0c80fb27a220fdaa89dd3e9edc36a9ce2ec1fe92f93603656151b32682d71ce53929ab7f65c0b7865ebbaed6d77670872ae1912cd30afe2c0ddf2c350c16954f46a82a80a7a93ea3257e4962b62dc8c4e83a7ae2bdfe7e3407914495af8fc28d15477eee2274c550fe2788d9c27486ff12c8abcaf8546ac2032febf709582feec62401908661825b54b7a64daa22a08e40f31cc7c9c92340ff88092a79c5d23c5b29c4bbe8bc59961ccef33fe95b26f1faa0cac75b30e74ec741f46605d998e46590387593de7448ceb885e3a9fbebbf8eb078ace0bb7fefd376fab3dad254e44e61680ec87231222a36c084512da68707377a3a4599478fd4095c8f09a4701bfff2764609bdfa79ecbe63f767c52f40503b8b86a49e5fc58df8f57ec3d064bfe11a1fd7dd58a1801268b56db1f75b04f46b5576bbdf4efb304cef87658baf7a809b156ffa8351fff0a11863587837eb6dab03c22783653488c53cf83b838eb8d57e63dbbae9d0d74afb712782daab97d97248358fcb10bffca500f36f18794d70850d5bd88fd863c60bd2ee7730aa4d666b584bcc4498a87e4b66d8af20c2b06e313fa63689d3f93f74aca64505fa82a1214c3e475fc3901cfeb11b12c24aaf6ec6e417028efaa2fcd200f73892d471eef0923e02faa5dfc4648bf606c1cb8a17397674dfddb75972de8aadeedfe32dde7d770cceb4bb8443ad989ea167504b8f6a585daa8217731a9a961a3d83bc86a9932282dd9ad5016fd8cfb4bf4a1789817de7dd268584d62afa1d153bbcf07c86e447bd423bcb8bb6adb0927e2f082f640aac7eae12d5f026cdf497d97719cc1533dd3591b71c9de5a64fea0d9ef2447c58c2a5e3152dff11c754193ed541bd7ad4115d01be4f32390e11f3feafbfe4c174f1be0647417f7bab7be869ef9f942f01a1d056d6abd642e240eef51c7fe0e590ebfff4fae7ce26b7ae2cf677f5baeae923fd94b4cddb8a741a4c3607830fda101f6ea30ca0b1b7a5c8739fa9b15d781a91dc6b6d50fdd2d8d90a4f58819a95e091289f8555fa876aa23618b7400c8d23f1404df31eb6e17c08f463c11c4e57a3395fc9284ad85346ed71e9c8594"}]}, @hopopts={0x1d, 0x5, '\x00', [@hao={0xc9, 0x10, @loopback}, @pad1, @enc_lim={0x4, 0x1, 0x97}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x41}}, @ra={0x5, 0x2, 0x7c}]}, @srh={0x2b, 0x10, 0x4, 0x8, 0x7, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev={0xfe, 0x80, '\x00', 0x2a}, @mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, @loopback, @local, @dev={0xfe, 0x80, '\x00', 0x23}]}], {{0x4e21, 0x4e20, 0x4, 0x1, 0x3, 0x0, 0x0, 0x6, 0x0, "45026f", 0x9, "b22e17"}, "a103f4471ac63b8d6ac875b5599573d07dd9bf95303736a3f708363bfd9a08520cb294eb4eed7658c08d6fb9b9d16e1af6c8222559f29c3ccad66c899378c08e731e275666a5c33d11709a5c7503ae9a5e7f5ee3c5d6d383dd445fe435156eb67be4dccca37da11fc5e2b8e224e0a6e53bd6f93d170bf8cb867c70461f0442477c811d06134328934cdc0c606393eb8485712b9102"}}}}}}}, 0x0) 09:55:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) [ 574.132506] kmemleak: 51 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:55:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 3) 09:55:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x35, 0x1, 0x0, 0x2}, {}, {0x6}]}) r0 = socket$netlink(0x10, 0x3, 0x15) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x920c1010}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x8c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4008800}, 0x40) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, 0x0) 09:55:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) 09:55:46 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000bc0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000840)={'wpan3\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000bc0), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r6) sendmsg$NL802154_CMD_SET_LBT_MODE(r5, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000001200000008020300", @ANYRES32=r3, @ANYBLOB="0500130001000000"], 0x24}}, 0x0) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r0, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 09:55:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read(r1, 0x0, 0xd) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:55:46 executing program 1: clone3(0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:55:46 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x7f, 0x0, 0x0, 0x5, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fork() r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) chdir(&(0x7f0000000180)='./file0/file0\x00') socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x1, 0x0, 0x0, 0x2000024, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d303030303030303030303030303038b03030313737372c002219f0c50e15989916ea01db271643ec03d1fb2874b80f73473496c356019f9599edd31d62d4a0e45a5bbe44a902e2d54e0a76f8684e3f6b4e43436ed756443b1563254a77dd4c43770715e96b3b629c8ba5764ee2d2b3b2294ad1a0b6d11e8f92952879eaac8763b6b2"]) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0xfffffffc}], 0x2, 0x40010120, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000300)={{{@in, @in6}}, {{@in6}}}, &(0x7f0000000080)=0xe8) 09:55:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, 0x0, 0x0) [ 582.501642] FAULT_INJECTION: forcing a failure. [ 582.501642] name failslab, interval 1, probability 0, space 0, times 1 [ 582.505034] CPU: 1 PID: 5462 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 582.506780] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 582.509341] Call Trace: [ 582.509845] dump_stack+0x107/0x163 [ 582.510528] should_fail.cold+0x5/0xa [ 582.511544] ? __alloc_skb+0x6d/0x620 [ 582.512328] should_failslab+0x5/0x10 [ 582.512981] kmem_cache_alloc_node+0x55/0x370 [ 582.513727] __alloc_skb+0x6d/0x620 [ 582.514343] netlink_sendmsg+0x98a/0xdf0 [ 582.515019] ? netlink_unicast+0x7e0/0x7e0 [ 582.515738] ? netlink_unicast+0x7e0/0x7e0 [ 582.516375] sock_sendmsg+0x150/0x190 [ 582.516946] ____sys_sendmsg+0x709/0x870 [ 582.518182] ? kernel_sendmsg+0x50/0x50 [ 582.520362] ? __ia32_sys_recvmmsg+0x260/0x260 [ 582.522246] ? perf_trace_lock+0xac/0x490 [ 582.523047] ? __lockdep_reset_lock+0x180/0x180 [ 582.523820] ? perf_trace_lock+0xac/0x490 [ 582.524610] ? SOFTIRQ_verbose+0x10/0x10 [ 582.525330] ___sys_sendmsg+0xf3/0x170 [ 582.525938] ? sendmsg_copy_msghdr+0x160/0x160 [ 582.526817] ? lock_downgrade+0x6d0/0x6d0 [ 582.527576] ? find_held_lock+0x2c/0x110 [ 582.528383] ? __fget_files+0x296/0x480 [ 582.529079] ? __fget_light+0xea/0x280 [ 582.529805] __sys_sendmsg+0xe5/0x1b0 [ 582.530543] ? __sys_sendmsg_sock+0xb0/0xb0 [ 582.531345] ? rcu_read_lock_any_held+0x69/0x90 [ 582.532247] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 582.533044] ? syscall_enter_from_user_mode+0x1d/0x50 [ 582.534044] ? trace_hardirqs_on+0x5b/0x180 [ 582.534651] do_syscall_64+0x33/0x40 [ 582.535181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 582.535977] RIP: 0033:0x7f406e572b19 [ 582.536604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 582.543839] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 582.547120] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 582.548870] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 582.550531] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 582.552433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 582.554087] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 582.556793] audit: type=1326 audit(1655978147.038:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fba8a95cb19 code=0x0 09:55:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 582.647509] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 09:55:47 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x80800, 0x0) getpeername(r0, 0x0, 0x0) 09:55:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 09:55:47 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fallocate(r1, 0x22, 0x20, 0xcf) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) dup3(r2, r0, 0x0) 09:55:47 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 582.994937] device veth0_vlan entered promiscuous mode [ 583.307825] audit: type=1326 audit(1655978147.789:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5454 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fba8a95cb19 code=0x0 [ 583.906548] device veth0_vlan entered promiscuous mode [ 597.970798] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:56:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 4) 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x28}}, 0x0) 09:56:11 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) fallocate(r1, 0x22, 0x20, 0xcf) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) dup3(r2, r0, 0x0) 09:56:11 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read(r1, 0x0, 0xd) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:56:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = accept(r0, &(0x7f00000000c0)=@hci, &(0x7f0000000000)=0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r4, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r7, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x9, 0x1f}}}}, [@NL80211_ATTR_IE={0x7, 0x2a, [@erp={0x2a, 0x1, {0x0, 0x0, 0x1}}]}, @NL80211_ATTR_MAC={0xa, 0x6, @random="2efae76bab2e"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9510b8579a188f8a}, 0x8840) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001d00210c00ebffffffffffff04"], 0x14}}, 0x0) 09:56:11 executing program 1: clone3(0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:56:11 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r4, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r7, @ANYBLOB='\b\x00?\x00\x00@'], 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r3, 0x400, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x476, 0x39}}}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) 09:56:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00_4\x00', @ANYRES16=r1, @ANYBLOB="2903000000000000000005000000"], 0x14}}, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) [ 606.759246] FAULT_INJECTION: forcing a failure. [ 606.759246] name failslab, interval 1, probability 0, space 0, times 0 [ 606.763061] CPU: 1 PID: 5508 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 606.764191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 606.766001] Call Trace: [ 606.766920] dump_stack+0x107/0x163 [ 606.767571] should_fail.cold+0x5/0xa [ 606.768180] ? create_object.isra.0+0x3a/0xa20 [ 606.768886] ? create_object.isra.0+0x3a/0xa20 [ 606.769611] should_failslab+0x5/0x10 [ 606.770378] kmem_cache_alloc+0x5b/0x350 [ 606.771617] create_object.isra.0+0x3a/0xa20 [ 606.773091] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 606.774197] kmem_cache_alloc_node+0x169/0x370 [ 606.775120] __alloc_skb+0x6d/0x620 [ 606.775863] netlink_sendmsg+0x98a/0xdf0 [ 606.776600] ? netlink_unicast+0x7e0/0x7e0 [ 606.777310] ? netlink_unicast+0x7e0/0x7e0 [ 606.778566] sock_sendmsg+0x150/0x190 [ 606.779364] ____sys_sendmsg+0x709/0x870 [ 606.780088] ? kernel_sendmsg+0x50/0x50 [ 606.781164] ? __ia32_sys_recvmmsg+0x260/0x260 [ 606.781926] ? perf_trace_lock+0xac/0x490 [ 606.782532] ? __lockdep_reset_lock+0x180/0x180 [ 606.783217] ? perf_trace_lock+0xac/0x490 [ 606.783878] ? SOFTIRQ_verbose+0x10/0x10 [ 606.784557] ___sys_sendmsg+0xf3/0x170 [ 606.785137] ? sendmsg_copy_msghdr+0x160/0x160 [ 606.785868] ? lock_downgrade+0x6d0/0x6d0 [ 606.787290] ? find_held_lock+0x2c/0x110 [ 606.788945] ? __fget_files+0x296/0x480 [ 606.789891] ? __fget_light+0xea/0x280 [ 606.790499] __sys_sendmsg+0xe5/0x1b0 [ 606.791408] ? __sys_sendmsg_sock+0xb0/0xb0 [ 606.792470] ? rcu_read_lock_any_held+0x69/0x90 [ 606.793581] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 606.795310] ? syscall_enter_from_user_mode+0x1d/0x50 [ 606.796330] ? trace_hardirqs_on+0x5b/0x180 [ 606.796954] do_syscall_64+0x33/0x40 [ 606.797470] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 606.798245] RIP: 0033:0x7f406e572b19 [ 606.798779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.801462] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 606.803411] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 606.809147] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 606.810388] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 606.811468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.812847] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 606.818000] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x28}}, 0x0) 09:56:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 5) 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x28}}, 0x0) [ 606.943129] FAULT_INJECTION: forcing a failure. [ 606.943129] name failslab, interval 1, probability 0, space 0, times 0 [ 606.945192] CPU: 1 PID: 5532 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 606.946200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 606.947836] Call Trace: [ 606.948243] dump_stack+0x107/0x163 [ 606.948739] should_fail.cold+0x5/0xa [ 606.949498] should_failslab+0x5/0x10 [ 606.950074] __kmalloc_node_track_caller+0x74/0x3f0 [ 606.950857] ? netlink_sendmsg+0x98a/0xdf0 [ 606.951519] __alloc_skb+0xb1/0x620 [ 606.956280] netlink_sendmsg+0x98a/0xdf0 [ 606.956752] ? netlink_unicast+0x7e0/0x7e0 [ 606.957261] ? netlink_unicast+0x7e0/0x7e0 [ 606.957776] sock_sendmsg+0x150/0x190 [ 606.958264] ____sys_sendmsg+0x709/0x870 [ 606.958737] ? kernel_sendmsg+0x50/0x50 [ 606.959203] ? __ia32_sys_recvmmsg+0x260/0x260 [ 606.959785] ? perf_trace_lock+0xac/0x490 [ 606.960297] ? __lockdep_reset_lock+0x180/0x180 [ 606.960853] ? perf_trace_lock+0xac/0x490 [ 606.961362] ? SOFTIRQ_verbose+0x10/0x10 [ 606.961873] ___sys_sendmsg+0xf3/0x170 [ 606.962337] ? sendmsg_copy_msghdr+0x160/0x160 [ 606.962929] ? lock_downgrade+0x6d0/0x6d0 [ 606.963410] ? find_held_lock+0x2c/0x110 [ 606.964125] ? __fget_files+0x296/0x480 [ 606.964705] ? __fget_light+0xea/0x280 [ 606.965670] __sys_sendmsg+0xe5/0x1b0 [ 606.966423] ? __sys_sendmsg_sock+0xb0/0xb0 [ 606.967047] ? rcu_read_lock_any_held+0x69/0x90 [ 606.967736] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 606.968554] ? syscall_enter_from_user_mode+0x1d/0x50 [ 606.969309] ? trace_hardirqs_on+0x5b/0x180 [ 606.969933] do_syscall_64+0x33/0x40 [ 606.970469] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 606.971217] RIP: 0033:0x7f406e572b19 [ 606.971747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 606.975012] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 606.976156] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 606.977188] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 606.978196] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 606.979198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.980261] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[], 0x28}}, 0x0) [ 607.022487] device veth0_vlan entered promiscuous mode 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[], 0x28}}, 0x0) 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[], 0x28}}, 0x0) 09:56:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 6) 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) [ 607.285323] FAULT_INJECTION: forcing a failure. [ 607.285323] name failslab, interval 1, probability 0, space 0, times 0 [ 607.290119] CPU: 0 PID: 5542 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 607.291175] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 607.292876] Call Trace: [ 607.293393] dump_stack+0x107/0x163 [ 607.293996] should_fail.cold+0x5/0xa [ 607.294582] ? create_object.isra.0+0x3a/0xa20 [ 607.295287] should_failslab+0x5/0x10 [ 607.295949] kmem_cache_alloc+0x5b/0x350 [ 607.296575] create_object.isra.0+0x3a/0xa20 [ 607.297307] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 607.298167] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 607.298921] ? netlink_sendmsg+0x98a/0xdf0 [ 607.299576] __alloc_skb+0xb1/0x620 [ 607.300200] netlink_sendmsg+0x98a/0xdf0 [ 607.300871] ? netlink_unicast+0x7e0/0x7e0 [ 607.301664] ? netlink_unicast+0x7e0/0x7e0 [ 607.305881] sock_sendmsg+0x150/0x190 [ 607.309908] ____sys_sendmsg+0x709/0x870 [ 607.311684] ? kernel_sendmsg+0x50/0x50 [ 607.312522] ? __ia32_sys_recvmmsg+0x260/0x260 09:56:11 executing program 0: sendmsg$NFT_MSG_GETOBJ_RESET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x38, 0x15, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x4}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x8000) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000240), 0x24, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x0) [ 607.313384] ? perf_trace_lock+0xac/0x490 [ 607.317922] ? __lockdep_reset_lock+0x180/0x180 [ 607.321608] ? perf_trace_lock+0xac/0x490 [ 607.326238] ? SOFTIRQ_verbose+0x10/0x10 [ 607.329066] ___sys_sendmsg+0xf3/0x170 [ 607.331272] ? sendmsg_copy_msghdr+0x160/0x160 [ 607.334534] ? lock_downgrade+0x6d0/0x6d0 [ 607.338920] ? find_held_lock+0x2c/0x110 [ 607.342999] ? __fget_files+0x296/0x480 [ 607.345904] ? __fget_light+0xea/0x280 [ 607.348885] __sys_sendmsg+0xe5/0x1b0 [ 607.351459] ? __sys_sendmsg_sock+0xb0/0xb0 [ 607.355756] ? rcu_read_lock_any_held+0x69/0x90 [ 607.360664] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 607.365196] ? syscall_enter_from_user_mode+0x1d/0x50 [ 607.370668] ? trace_hardirqs_on+0x5b/0x180 [ 607.373378] do_syscall_64+0x33/0x40 [ 607.375610] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 607.379804] RIP: 0033:0x7f406e572b19 [ 607.380565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 607.388320] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 607.392204] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 607.395271] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 607.398551] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 607.404211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 607.411228] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 607.416791] hpet: Lost 7 RTC interrupts 09:56:11 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) [ 607.432421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:56:12 executing program 2: ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0xe8f152a5295726fc}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file0\x00'}) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x6000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0), &(0x7f0000001500)='./file0\x00', 0x8, 0x6) openat2$dir(0xffffffffffffff9c, &(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x0, 0x100, 0x9}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x20108, 0x6}) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x9}]}, 0x10) [ 621.403271] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:56:34 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read(r1, 0x0, 0xd) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:56:34 executing program 0: openat$sr(0xffffffffffffff9c, &(0x7f0000000180), 0x101000, 0x0) r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r1, 0x0) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x7}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0xff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x400c081) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r2) syz_io_uring_setup(0xb6, &(0x7f0000000000)={0x0, 0x800000}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:56:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 7) 09:56:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:56:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) 09:56:34 executing program 1: clone3(0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:56:34 executing program 4: sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x64, 0x0, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVKEY={0x4}, @NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0x300}}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_DEVKEY={0xc, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x1f}]}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x1080) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x1d) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') setxattr$incfs_id(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240), &(0x7f0000000180)={'0000000000000000000000000000000', 0x31}, 0x20, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) chmod(&(0x7f0000000440)='./file0\x00', 0x6a) getpgrp(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000004c0)={{0x1, 0x1, 0x18, r2}, './file0/file0\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, 0x1e, 0x0, 0x70bd2d, 0x25dfdbff, {0xb}, [@typed={0x14, 0x34, 0x0, 0x0, @ipv6=@private1}, @nested={0x24, 0x8, 0x0, 0x1, [@typed={0x8, 0x72, 0x0, 0x0, @u32=0x4}, @typed={0x8, 0x21, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x66, 0x0, 0x0, @fd=r5}, @typed={0x8, 0x18, 0x0, 0x0, @ipv4=@local}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x20040054) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)={0x28, 0x20, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0xc, 0x17, 0x0, 0x0, @u64}]}, 0x28}}, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)={0x40, 0x20, 0x400, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x14, 0x17, 0x0, 0x0, @ipv6=@empty}, @typed={0x8, 0x79, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x64, 0x0, 0x0, @fd=r4}]}, 0x40}}, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000140)={0x2a, 0x29, 0x2, {0x6, [{{0x20, 0x2, 0x5}, 0x1, 0x9, 0x7, './file0'}]}}, 0x2a) r6 = socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') sendfile(r6, r0, 0x0, 0xec0) 09:56:34 executing program 2: fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x2, 0x1) r0 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x20, 0x80}, 0x18) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x767e, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/35) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x10800, 0x0) r3 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, &(0x7f00000000c0)=0x1c) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e23, 0x7f, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4d}, 0x1c) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000000)={0x0, 0x40, 0x9}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x58}, 0x0, 0x100000000000, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x2) ftruncate(r2, 0x8ce) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, 0x0, 0x0, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x82082, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r5, 0x9408, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) [ 629.638788] FAULT_INJECTION: forcing a failure. [ 629.638788] name failslab, interval 1, probability 0, space 0, times 0 [ 629.640646] CPU: 0 PID: 5578 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 629.641821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 629.643695] Call Trace: [ 629.644251] dump_stack+0x107/0x163 [ 629.644942] should_fail.cold+0x5/0xa [ 629.645529] ? create_object.isra.0+0x3a/0xa20 [ 629.646277] should_failslab+0x5/0x10 [ 629.646887] kmem_cache_alloc+0x5b/0x350 [ 629.647584] create_object.isra.0+0x3a/0xa20 [ 629.648319] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 629.649126] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 629.649898] ? netlink_sendmsg+0x98a/0xdf0 [ 629.650541] __alloc_skb+0xb1/0x620 [ 629.651110] netlink_sendmsg+0x98a/0xdf0 [ 629.651743] ? netlink_unicast+0x7e0/0x7e0 [ 629.652437] ? netlink_unicast+0x7e0/0x7e0 [ 629.653141] sock_sendmsg+0x150/0x190 [ 629.653182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=553 sclass=netlink_route_socket pid=5573 comm=syz-executor.4 [ 629.653698] ____sys_sendmsg+0x709/0x870 [ 629.653720] ? kernel_sendmsg+0x50/0x50 [ 629.656611] ? __ia32_sys_recvmmsg+0x260/0x260 [ 629.657306] ? perf_trace_lock+0xac/0x490 [ 629.657947] ? __lockdep_reset_lock+0x180/0x180 [ 629.658654] ? perf_trace_lock+0xac/0x490 [ 629.659291] ? SOFTIRQ_verbose+0x10/0x10 [ 629.659933] ___sys_sendmsg+0xf3/0x170 [ 629.660539] ? sendmsg_copy_msghdr+0x160/0x160 [ 629.661225] ? lock_downgrade+0x6d0/0x6d0 [ 629.661874] ? find_held_lock+0x2c/0x110 [ 629.662482] ? __fget_files+0x296/0x480 [ 629.663096] ? __fget_light+0xea/0x280 [ 629.663700] __sys_sendmsg+0xe5/0x1b0 [ 629.664278] ? __sys_sendmsg_sock+0xb0/0xb0 [ 629.664864] ? rcu_read_lock_any_held+0x69/0x90 [ 629.665556] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 629.666324] ? syscall_enter_from_user_mode+0x1d/0x50 [ 629.667086] ? trace_hardirqs_on+0x5b/0x180 [ 629.667731] do_syscall_64+0x33/0x40 [ 629.668292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 629.669058] RIP: 0033:0x7f406e572b19 [ 629.669597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 629.672479] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 629.673705] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 629.674827] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 629.675899] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 629.676823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=553 sclass=netlink_route_socket pid=5579 comm=syz-executor.4 [ 629.677007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 629.677019] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 629.677299] hpet: Lost 1 RTC interrupts [ 629.684335] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:56:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 8) 09:56:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00"], 0x28}}, 0x0) [ 629.777406] FAULT_INJECTION: forcing a failure. [ 629.777406] name failslab, interval 1, probability 0, space 0, times 0 [ 629.779327] CPU: 0 PID: 5587 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 629.780304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 629.782026] Call Trace: [ 629.782411] dump_stack+0x107/0x163 [ 629.782926] should_fail.cold+0x5/0xa [ 629.783457] ? create_object.isra.0+0x3a/0xa20 [ 629.784133] should_failslab+0x5/0x10 [ 629.784661] kmem_cache_alloc+0x5b/0x350 [ 629.785256] create_object.isra.0+0x3a/0xa20 [ 629.785884] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 629.786582] kmem_cache_alloc+0x159/0x350 [ 629.787142] __skb_ext_alloc+0x19/0x80 [ 629.787653] skb_ext_add+0x504/0x670 [ 629.788175] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 629.788923] __alloc_skb+0x3c1/0x620 [ 629.789441] netlink_sendmsg+0x98a/0xdf0 [ 629.790009] ? netlink_unicast+0x7e0/0x7e0 [ 629.790614] ? netlink_unicast+0x7e0/0x7e0 [ 629.791240] sock_sendmsg+0x150/0x190 [ 629.791773] ____sys_sendmsg+0x709/0x870 [ 629.792360] ? kernel_sendmsg+0x50/0x50 [ 629.792908] ? __ia32_sys_recvmmsg+0x260/0x260 [ 629.793608] ? perf_trace_lock+0xac/0x490 [ 629.794182] ? __lockdep_reset_lock+0x180/0x180 [ 629.794796] ? perf_trace_lock+0xac/0x490 [ 629.795375] ? SOFTIRQ_verbose+0x10/0x10 [ 629.795959] ___sys_sendmsg+0xf3/0x170 [ 629.796566] ? sendmsg_copy_msghdr+0x160/0x160 [ 629.797220] ? lock_downgrade+0x6d0/0x6d0 [ 629.797810] ? find_held_lock+0x2c/0x110 [ 629.798422] ? __fget_files+0x296/0x480 [ 629.798997] ? __fget_light+0xea/0x280 [ 629.799663] __sys_sendmsg+0xe5/0x1b0 [ 629.800483] ? __sys_sendmsg_sock+0xb0/0xb0 [ 629.801140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 629.801511] ? rcu_read_lock_any_held+0x69/0x90 [ 629.801554] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 629.804845] ? syscall_enter_from_user_mode+0x1d/0x50 [ 629.805876] ? trace_hardirqs_on+0x5b/0x180 [ 629.806566] do_syscall_64+0x33/0x40 [ 629.807107] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 629.808280] RIP: 0033:0x7f406e572b19 [ 629.809652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 629.812537] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 629.813704] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 629.814999] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 629.816196] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 629.817257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 629.818325] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 629.819551] hpet: Lost 1 RTC interrupts [ 629.820347] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:56:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00"], 0x28}}, 0x0) 09:56:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}, {&(0x7f0000000140)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f", 0x2c, 0x4800}], 0x200000, &(0x7f0000000180)=ANY=[@ANYRESHEX]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) [ 629.891468] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:56:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 9) 09:56:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00"], 0x28}}, 0x0) [ 629.959014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:56:34 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x200000, 0x80) fcntl$notify(r0, 0x402, 0x1d) r1 = syz_io_uring_setup(0x7398, &(0x7f0000000940)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_io_uring_setup(0x4806, &(0x7f0000000000)={0x0, 0x4fac, 0x2e, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 629.980527] FAULT_INJECTION: forcing a failure. [ 629.980527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 629.982437] CPU: 1 PID: 5602 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 629.983492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 629.985199] Call Trace: [ 629.985624] dump_stack+0x107/0x163 [ 629.986171] should_fail.cold+0x5/0xa [ 629.986780] _copy_from_iter_full+0x1ff/0x940 [ 629.987470] ? __check_object_size+0x319/0x440 [ 629.988166] netlink_sendmsg+0x86b/0xdf0 [ 629.988767] ? netlink_unicast+0x7e0/0x7e0 [ 629.989432] ? netlink_unicast+0x7e0/0x7e0 [ 629.990084] sock_sendmsg+0x150/0x190 [ 629.990643] ____sys_sendmsg+0x709/0x870 [ 629.991238] ? kernel_sendmsg+0x50/0x50 [ 629.991846] ? __ia32_sys_recvmmsg+0x260/0x260 [ 629.992577] ? perf_trace_lock+0xac/0x490 [ 629.993185] ? __lockdep_reset_lock+0x180/0x180 [ 629.993866] ? perf_trace_lock+0xac/0x490 [ 629.994477] ? SOFTIRQ_verbose+0x10/0x10 [ 629.995072] ___sys_sendmsg+0xf3/0x170 [ 629.995638] ? sendmsg_copy_msghdr+0x160/0x160 [ 629.996357] ? lock_downgrade+0x6d0/0x6d0 [ 629.997085] ? find_held_lock+0x2c/0x110 [ 629.997700] ? __fget_files+0x296/0x480 [ 629.998314] ? __fget_light+0xea/0x280 [ 629.998933] __sys_sendmsg+0xe5/0x1b0 [ 629.999483] ? __sys_sendmsg_sock+0xb0/0xb0 [ 630.000196] ? rcu_read_lock_any_held+0x69/0x90 [ 630.000933] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 630.001766] ? syscall_enter_from_user_mode+0x1d/0x50 [ 630.002538] ? trace_hardirqs_on+0x5b/0x180 [ 630.003185] do_syscall_64+0x33/0x40 [ 630.003730] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 630.004502] RIP: 0033:0x7f406e572b19 [ 630.005040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.007712] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 630.008886] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 630.009946] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 630.010992] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 630.012224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 630.013344] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 09:56:34 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x29, &(0x7f0000000040)}) r1 = getpid() r2 = getpid() ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000040)={0x0, 0xfff, 0x3}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fc00002}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000140)={0x0}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000200)={r4, 0x1, r5, 0x7fffffff}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000200)={r4, 0x8000}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0xcf}}, './file0\x00'}) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000080)=0x0) syz_open_procfs$namespace(r7, &(0x7f00000000c0)='ns/time\x00') kcmp(r1, r2, 0x0, r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000180)={r8, 0x9, 0x4}) [ 643.901169] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:56:56 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read(r1, 0x0, 0xd) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:56:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 10) 09:56:56 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x200000, 0x80) fcntl$notify(r0, 0x402, 0x1d) r1 = syz_io_uring_setup(0x7398, &(0x7f0000000940)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) syz_io_uring_setup(0x4806, &(0x7f0000000000)={0x0, 0x4fac, 0x2e, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 09:56:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) unshare(0x42000000) unshare(0x46050200) 09:56:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) 09:56:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 09:56:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000001c0)=""/244) 09:56:56 executing program 1: clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 652.020724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 652.024524] FAULT_INJECTION: forcing a failure. [ 652.024524] name failslab, interval 1, probability 0, space 0, times 0 [ 652.026422] CPU: 0 PID: 5624 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 652.027418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 652.029183] Call Trace: [ 652.029598] dump_stack+0x107/0x163 [ 652.030134] should_fail.cold+0x5/0xa [ 652.030693] ? __alloc_skb+0x6d/0x620 [ 652.031278] should_failslab+0x5/0x10 [ 652.031855] kmem_cache_alloc_node+0x55/0x370 [ 652.032568] __alloc_skb+0x6d/0x620 [ 652.033129] netlink_ack+0x1ed/0xab0 [ 652.033703] ? perf_trace_lock+0xac/0x490 [ 652.034312] ? netlink_sendmsg+0xdf0/0xdf0 [ 652.034943] ? __lockdep_reset_lock+0x180/0x180 [ 652.035650] netlink_rcv_skb+0x348/0x430 [ 652.036240] ? rtnetlink_put_metrics+0x510/0x510 [ 652.036985] ? netlink_ack+0xab0/0xab0 [ 652.037571] ? netlink_deliver_tap+0x1ae/0xc40 [ 652.038279] ? netlink_deliver_tap+0x1c4/0xc40 [ 652.038957] ? is_vmalloc_addr+0x7b/0xb0 [ 652.039574] netlink_unicast+0x53a/0x7e0 [ 652.040204] ? netlink_attachskb+0x810/0x810 [ 652.040970] netlink_sendmsg+0x901/0xdf0 [ 652.041596] ? netlink_unicast+0x7e0/0x7e0 [ 652.042280] ? netlink_unicast+0x7e0/0x7e0 [ 652.042948] sock_sendmsg+0x150/0x190 [ 652.043534] ____sys_sendmsg+0x709/0x870 [ 652.044141] ? kernel_sendmsg+0x50/0x50 [ 652.044795] ? __ia32_sys_recvmmsg+0x260/0x260 [ 652.045486] ? perf_trace_lock+0xac/0x490 [ 652.046124] ? __lockdep_reset_lock+0x180/0x180 [ 652.046825] ? perf_trace_lock+0xac/0x490 [ 652.047454] ? SOFTIRQ_verbose+0x10/0x10 [ 652.048077] ___sys_sendmsg+0xf3/0x170 [ 652.048693] ? sendmsg_copy_msghdr+0x160/0x160 [ 652.049375] ? lock_downgrade+0x6d0/0x6d0 [ 652.050016] ? find_held_lock+0x2c/0x110 [ 652.050658] ? __fget_files+0x296/0x480 [ 652.051269] ? __fget_light+0xea/0x280 [ 652.051856] __sys_sendmsg+0xe5/0x1b0 [ 652.052445] ? __sys_sendmsg_sock+0xb0/0xb0 [ 652.053091] ? rcu_read_lock_any_held+0x69/0x90 [ 652.053813] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 652.054607] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.055358] ? trace_hardirqs_on+0x5b/0x180 [ 652.055995] do_syscall_64+0x33/0x40 [ 652.056594] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 652.057356] RIP: 0033:0x7f406e572b19 [ 652.057910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.060664] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 652.061799] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 652.062871] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 652.063935] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.065056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 652.066131] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 652.067517] hpet: Lost 2 RTC interrupts [ 665.687097] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:57:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 11) 09:57:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) 09:57:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 09:57:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r1, 0x10, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0xfe}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x7}, @IEEE802154_ATTR_LBT_ENABLED={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r2, &(0x7f00000001c0)=""/251, 0xfb) 09:57:18 executing program 4: syz_emit_ethernet(0x46, &(0x7f00000001c0)={@link_local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0x3, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @dev, @broadcast}, "c8ed01b536ca3d00"}}}}}, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvfrom(r0, &(0x7f0000000000)=""/141, 0x8d, 0x0, &(0x7f00000000c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x80) 09:57:18 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:57:18 executing program 1: clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:57:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00a0f2a36fe4c2d41defcb5df00f47f27d95337e28850352614ada45d18c3bb45cc11d2d09f6b742eebf68bda8d3c98daae6728eb2b98f4f0954e39212b404f75672254dd395eecfcaf02df4f2fa0a2d6f38d9e56dd856bc0b9d41a435acba90ef0ebef6f2e3d0e471eeeeb419c93e4bef2505d26f6bb8d2de"]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = fsmount(r0, 0x0, 0x85) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_GET_COALESCE(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, r4, 0x220, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r5, &(0x7f0000000240)=""/245, 0xf5) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000003c0)={0x10001, 0x9}) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 673.643948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 673.650355] FAULT_INJECTION: forcing a failure. [ 673.650355] name failslab, interval 1, probability 0, space 0, times 0 [ 673.652404] CPU: 1 PID: 5667 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 673.653766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 673.655659] Call Trace: [ 673.656126] dump_stack+0x107/0x163 [ 673.656764] should_fail.cold+0x5/0xa [ 673.657381] ? create_object.isra.0+0x3a/0xa20 [ 673.658150] should_failslab+0x5/0x10 [ 673.658749] kmem_cache_alloc+0x5b/0x350 [ 673.659356] create_object.isra.0+0x3a/0xa20 [ 673.660007] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 673.660860] kmem_cache_alloc_node+0x169/0x370 [ 673.661557] __alloc_skb+0x6d/0x620 [ 673.662172] netlink_ack+0x1ed/0xab0 [ 673.662760] ? perf_trace_lock+0xac/0x490 [ 673.663382] ? netlink_sendmsg+0xdf0/0xdf0 [ 673.664087] ? __lockdep_reset_lock+0x180/0x180 [ 673.664803] netlink_rcv_skb+0x348/0x430 [ 673.665469] ? rtnetlink_put_metrics+0x510/0x510 [ 673.666181] ? netlink_ack+0xab0/0xab0 [ 673.666764] ? netlink_deliver_tap+0x1ae/0xc40 [ 673.667549] ? netlink_deliver_tap+0x1c4/0xc40 [ 673.668253] ? is_vmalloc_addr+0x7b/0xb0 [ 673.669017] netlink_unicast+0x53a/0x7e0 [ 673.669737] ? netlink_attachskb+0x810/0x810 [ 673.670428] netlink_sendmsg+0x901/0xdf0 [ 673.671080] ? netlink_unicast+0x7e0/0x7e0 [ 673.671790] ? netlink_unicast+0x7e0/0x7e0 [ 673.672480] sock_sendmsg+0x150/0x190 [ 673.673071] ____sys_sendmsg+0x709/0x870 [ 673.673699] ? kernel_sendmsg+0x50/0x50 [ 673.674298] ? __ia32_sys_recvmmsg+0x260/0x260 [ 673.675033] ? perf_trace_lock+0xac/0x490 [ 673.675760] ? __lockdep_reset_lock+0x180/0x180 [ 673.676450] ? perf_trace_lock+0xac/0x490 [ 673.677101] ? SOFTIRQ_verbose+0x10/0x10 [ 673.677849] ___sys_sendmsg+0xf3/0x170 [ 673.678520] ? sendmsg_copy_msghdr+0x160/0x160 [ 673.679196] ? lock_downgrade+0x6d0/0x6d0 [ 673.679815] ? find_held_lock+0x2c/0x110 [ 673.680442] ? __fget_files+0x296/0x480 [ 673.681062] ? __fget_light+0xea/0x280 [ 673.681673] __sys_sendmsg+0xe5/0x1b0 [ 673.682246] ? __sys_sendmsg_sock+0xb0/0xb0 [ 673.682914] ? rcu_read_lock_any_held+0x69/0x90 [ 673.683634] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 673.684421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 673.685363] ? trace_hardirqs_on+0x5b/0x180 [ 673.685992] do_syscall_64+0x33/0x40 [ 673.686556] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 673.687320] RIP: 0033:0x7f406e572b19 [ 673.687888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 673.690653] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 673.691786] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 673.692894] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 673.693993] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 673.695072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.696170] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 09:57:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x28}}, 0x0) 09:57:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 12) [ 673.829278] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 673.839097] FAULT_INJECTION: forcing a failure. [ 673.839097] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 673.841329] CPU: 1 PID: 5679 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 673.842330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 673.843958] Call Trace: [ 673.844371] dump_stack+0x107/0x163 [ 673.844947] should_fail.cold+0x5/0xa [ 673.845512] __alloc_pages_nodemask+0x182/0x680 [ 673.846226] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 673.847124] ? kmem_cache_alloc+0x33f/0x350 [ 673.847748] alloc_pages_current+0x187/0x280 [ 673.848377] allocate_slab+0x26b/0x380 [ 673.848974] ___slab_alloc+0x46c/0x700 [ 673.849540] ? create_object.isra.0+0x3a/0xa20 [ 673.850201] ? lock_acquire+0x197/0x490 [ 673.850784] ? find_held_lock+0x2c/0x110 [ 673.851365] ? create_object.isra.0+0x3a/0xa20 [ 673.852021] ? kmem_cache_alloc+0x33f/0x350 [ 673.852638] ? create_object.isra.0+0x3a/0xa20 [ 673.853315] kmem_cache_alloc+0x33f/0x350 [ 673.853912] create_object.isra.0+0x3a/0xa20 [ 673.854547] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 673.855257] kmem_cache_alloc_node+0x169/0x370 [ 673.855904] __alloc_skb+0x6d/0x620 [ 673.856508] netlink_ack+0x1ed/0xab0 [ 673.857130] ? perf_trace_lock+0xac/0x490 [ 673.857708] ? netlink_sendmsg+0xdf0/0xdf0 [ 673.858311] ? __lockdep_reset_lock+0x180/0x180 [ 673.858952] netlink_rcv_skb+0x348/0x430 [ 673.859512] ? rtnetlink_put_metrics+0x510/0x510 [ 673.860175] ? netlink_ack+0xab0/0xab0 [ 673.860710] ? netlink_deliver_tap+0x1ae/0xc40 [ 673.861381] ? netlink_deliver_tap+0x1c4/0xc40 [ 673.862033] ? is_vmalloc_addr+0x7b/0xb0 [ 673.862619] netlink_unicast+0x53a/0x7e0 [ 673.863206] ? netlink_attachskb+0x810/0x810 [ 673.863841] netlink_sendmsg+0x901/0xdf0 [ 673.864434] ? netlink_unicast+0x7e0/0x7e0 [ 673.865099] ? netlink_unicast+0x7e0/0x7e0 [ 673.865705] sock_sendmsg+0x150/0x190 [ 673.866244] ____sys_sendmsg+0x709/0x870 [ 673.866826] ? kernel_sendmsg+0x50/0x50 [ 673.867400] ? __ia32_sys_recvmmsg+0x260/0x260 [ 673.868152] ? perf_trace_lock+0xac/0x490 [ 673.868951] ? __lockdep_reset_lock+0x180/0x180 [ 673.869596] ? perf_trace_lock+0xac/0x490 [ 673.870174] ? SOFTIRQ_verbose+0x10/0x10 [ 673.870758] ___sys_sendmsg+0xf3/0x170 [ 673.871338] ? sendmsg_copy_msghdr+0x160/0x160 [ 673.872417] ? lock_downgrade+0x6d0/0x6d0 [ 673.873063] ? find_held_lock+0x2c/0x110 [ 673.873627] ? __fget_files+0x296/0x480 [ 673.874185] ? __fget_light+0xea/0x280 [ 673.874754] __sys_sendmsg+0xe5/0x1b0 [ 673.875321] ? __sys_sendmsg_sock+0xb0/0xb0 [ 673.875937] ? rcu_read_lock_any_held+0x69/0x90 [ 673.876811] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 673.877782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 673.878632] ? trace_hardirqs_on+0x5b/0x180 [ 673.879228] do_syscall_64+0x33/0x40 [ 673.879760] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 673.880517] RIP: 0033:0x7f406e572b19 [ 673.881101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 673.883940] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 673.885095] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 673.886157] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 673.887211] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 673.888469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 673.889515] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 689.946296] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:57:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00a0f2a36fe4c2d41defcb5df00f47f27d95337e28850352614ada45d18c3bb45cc11d2d09f6b742eebf68bda8d3c98daae6728eb2b98f4f0954e39212b404f75672254dd395eecfcaf02df4f2fa0a2d6f38d9e56dd856bc0b9d41a435acba90ef0ebef6f2e3d0e471eeeeb419c93e4bef2505d26f6bb8d2de"]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = fsmount(r0, 0x0, 0x85) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_GET_COALESCE(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, r4, 0x220, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r5, &(0x7f0000000240)=""/245, 0xf5) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000003c0)={0x10001, 0x9}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 09:57:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000001c0)={0x20, 0x1c, 0x55, 0x8001, "6e48501a20b5022c057a1d881960c144764264e7334e8be7c2a3346605ff9e99"}) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, &(0x7f00000000c0)=""/248, 0xf8) r2 = open(&(0x7f0000000000)='./file0\x00', 0x401, 0x22) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000080)=""/45) 09:57:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 09:57:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 13) 09:57:43 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:57:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 09:57:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-'], 0x28}}, 0x0) 09:57:43 executing program 1: clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 698.817071] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 698.818670] FAULT_INJECTION: forcing a failure. [ 698.818670] name failslab, interval 1, probability 0, space 0, times 0 [ 698.820423] CPU: 1 PID: 5706 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 698.821534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 698.823246] Call Trace: [ 698.823642] dump_stack+0x107/0x163 [ 698.824175] should_fail.cold+0x5/0xa [ 698.824756] ? create_object.isra.0+0x3a/0xa20 [ 698.825473] should_failslab+0x5/0x10 [ 698.826280] kmem_cache_alloc+0x5b/0x350 [ 698.826921] create_object.isra.0+0x3a/0xa20 [ 698.827598] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 698.828374] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 698.829207] ? netlink_ack+0x1ed/0xab0 [ 698.829782] __alloc_skb+0xb1/0x620 [ 698.830333] netlink_ack+0x1ed/0xab0 [ 698.830913] ? perf_trace_lock+0xac/0x490 [ 698.831565] ? netlink_sendmsg+0xdf0/0xdf0 [ 698.832346] ? __lockdep_reset_lock+0x180/0x180 [ 698.833059] netlink_rcv_skb+0x348/0x430 [ 698.833661] ? rtnetlink_put_metrics+0x510/0x510 [ 698.834361] ? netlink_ack+0xab0/0xab0 [ 698.834907] ? netlink_deliver_tap+0x1ae/0xc40 [ 698.835551] ? netlink_deliver_tap+0x1c4/0xc40 [ 698.836215] ? is_vmalloc_addr+0x7b/0xb0 [ 698.836796] netlink_unicast+0x53a/0x7e0 [ 698.837395] ? netlink_attachskb+0x810/0x810 [ 698.838041] netlink_sendmsg+0x901/0xdf0 [ 698.838657] ? netlink_unicast+0x7e0/0x7e0 [ 698.839296] ? netlink_unicast+0x7e0/0x7e0 [ 698.839969] sock_sendmsg+0x150/0x190 [ 698.840531] ____sys_sendmsg+0x709/0x870 [ 698.841187] ? kernel_sendmsg+0x50/0x50 [ 698.842076] ? __ia32_sys_recvmmsg+0x260/0x260 [ 698.842741] ? perf_trace_lock+0xac/0x490 [ 698.843360] ? __lockdep_reset_lock+0x180/0x180 [ 698.844138] ? perf_trace_lock+0xac/0x490 [ 698.844777] ? SOFTIRQ_verbose+0x10/0x10 [ 698.845390] ___sys_sendmsg+0xf3/0x170 [ 698.845990] ? sendmsg_copy_msghdr+0x160/0x160 [ 698.846685] ? lock_downgrade+0x6d0/0x6d0 [ 698.847294] ? find_held_lock+0x2c/0x110 [ 698.847871] ? __fget_files+0x296/0x480 [ 698.848452] ? __fget_light+0xea/0x280 [ 698.849004] __sys_sendmsg+0xe5/0x1b0 [ 698.849595] ? __sys_sendmsg_sock+0xb0/0xb0 [ 698.850204] ? rcu_read_lock_any_held+0x69/0x90 [ 698.850871] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 698.851596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 698.852294] ? trace_hardirqs_on+0x5b/0x180 [ 698.852884] do_syscall_64+0x33/0x40 [ 698.853429] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 698.854158] RIP: 0033:0x7f406e572b19 [ 698.854692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.857565] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 698.858696] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 698.859699] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 698.860674] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 698.861713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 698.862735] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 09:57:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-'], 0x28}}, 0x0) 09:57:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 14) 09:57:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-'], 0x28}}, 0x0) [ 699.042652] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 699.046551] FAULT_INJECTION: forcing a failure. [ 699.046551] name failslab, interval 1, probability 0, space 0, times 0 [ 699.048296] CPU: 1 PID: 5723 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 699.049249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 699.050800] Call Trace: [ 699.051179] dump_stack+0x107/0x163 [ 699.051694] should_fail.cold+0x5/0xa [ 699.052239] ? __skb_ext_alloc+0x19/0x80 [ 699.052887] should_failslab+0x5/0x10 [ 699.053462] kmem_cache_alloc+0x5b/0x350 [ 699.054033] __skb_ext_alloc+0x19/0x80 [ 699.054557] skb_ext_add+0x504/0x670 [ 699.055063] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 699.055793] __alloc_skb+0x3c1/0x620 [ 699.056331] netlink_ack+0x1ed/0xab0 [ 699.056866] ? perf_trace_lock+0xac/0x490 [ 699.057464] ? netlink_sendmsg+0xdf0/0xdf0 [ 699.058072] ? __lockdep_reset_lock+0x180/0x180 [ 699.058740] netlink_rcv_skb+0x348/0x430 [ 699.059305] ? rtnetlink_put_metrics+0x510/0x510 [ 699.060066] ? netlink_ack+0xab0/0xab0 [ 699.060728] ? netlink_deliver_tap+0x1ae/0xc40 [ 699.065559] ? netlink_deliver_tap+0x1c4/0xc40 [ 699.066213] ? is_vmalloc_addr+0x7b/0xb0 [ 699.066779] netlink_unicast+0x53a/0x7e0 [ 699.067348] ? netlink_attachskb+0x810/0x810 [ 699.067957] netlink_sendmsg+0x901/0xdf0 [ 699.068517] ? netlink_unicast+0x7e0/0x7e0 [ 699.069177] ? netlink_unicast+0x7e0/0x7e0 [ 699.069776] sock_sendmsg+0x150/0x190 [ 699.070352] ____sys_sendmsg+0x709/0x870 [ 699.070984] ? kernel_sendmsg+0x50/0x50 [ 699.071554] ? __ia32_sys_recvmmsg+0x260/0x260 [ 699.072291] ? perf_trace_lock+0xac/0x490 [ 699.072912] ? __lockdep_reset_lock+0x180/0x180 [ 699.073660] ? perf_trace_lock+0xac/0x490 [ 699.074299] ? SOFTIRQ_verbose+0x10/0x10 [ 699.074902] ___sys_sendmsg+0xf3/0x170 [ 699.075514] ? sendmsg_copy_msghdr+0x160/0x160 [ 699.076601] ? lock_downgrade+0x6d0/0x6d0 [ 699.077304] ? find_held_lock+0x2c/0x110 [ 699.077925] ? __fget_files+0x296/0x480 [ 699.078608] ? __fget_light+0xea/0x280 [ 699.079352] __sys_sendmsg+0xe5/0x1b0 [ 699.079906] ? __sys_sendmsg_sock+0xb0/0xb0 [ 699.080516] ? rcu_read_lock_any_held+0x69/0x90 [ 699.081217] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 699.082098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 699.083140] ? trace_hardirqs_on+0x5b/0x180 [ 699.083771] do_syscall_64+0x33/0x40 [ 699.084336] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 699.085132] RIP: 0033:0x7f406e572b19 [ 699.085645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.088573] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 699.090115] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 699.091127] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 699.092382] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.093633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.094679] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 09:57:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 699.162330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:57:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 15) 09:57:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-'], 0x28}}, 0x0) [ 699.238176] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 699.240765] FAULT_INJECTION: forcing a failure. [ 699.240765] name failslab, interval 1, probability 0, space 0, times 0 [ 699.242331] CPU: 1 PID: 5730 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 699.243262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 699.245124] Call Trace: [ 699.245550] dump_stack+0x107/0x163 [ 699.246094] should_fail.cold+0x5/0xa [ 699.246799] ? create_object.isra.0+0x3a/0xa20 [ 699.247453] should_failslab+0x5/0x10 [ 699.248241] kmem_cache_alloc+0x5b/0x350 [ 699.248818] create_object.isra.0+0x3a/0xa20 [ 699.249456] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 699.250176] kmem_cache_alloc+0x159/0x350 [ 699.250974] __skb_ext_alloc+0x19/0x80 [ 699.251599] skb_ext_add+0x504/0x670 [ 699.252163] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 699.252936] __alloc_skb+0x3c1/0x620 [ 699.257684] netlink_ack+0x1ed/0xab0 [ 699.258236] ? perf_trace_lock+0xac/0x490 [ 699.258829] ? netlink_sendmsg+0xdf0/0xdf0 [ 699.259437] ? __lockdep_reset_lock+0x180/0x180 [ 699.260273] netlink_rcv_skb+0x348/0x430 [ 699.260863] ? rtnetlink_put_metrics+0x510/0x510 [ 699.261617] ? netlink_ack+0xab0/0xab0 [ 699.262187] ? netlink_deliver_tap+0x1ae/0xc40 [ 699.262868] ? netlink_deliver_tap+0x1c4/0xc40 [ 699.263754] ? is_vmalloc_addr+0x7b/0xb0 [ 699.264337] netlink_unicast+0x53a/0x7e0 [ 699.264938] ? netlink_attachskb+0x810/0x810 [ 699.265601] netlink_sendmsg+0x901/0xdf0 [ 699.266190] ? netlink_unicast+0x7e0/0x7e0 [ 699.266828] ? netlink_unicast+0x7e0/0x7e0 [ 699.267433] sock_sendmsg+0x150/0x190 [ 699.268004] ____sys_sendmsg+0x709/0x870 [ 699.268597] ? kernel_sendmsg+0x50/0x50 [ 699.269198] ? __ia32_sys_recvmmsg+0x260/0x260 [ 699.269828] ? perf_trace_lock+0xac/0x490 [ 699.270397] ? __lockdep_reset_lock+0x180/0x180 [ 699.271030] ? perf_trace_lock+0xac/0x490 [ 699.271594] ? SOFTIRQ_verbose+0x10/0x10 [ 699.272147] ___sys_sendmsg+0xf3/0x170 [ 699.272719] ? sendmsg_copy_msghdr+0x160/0x160 [ 699.273375] ? lock_downgrade+0x6d0/0x6d0 [ 699.273968] ? find_held_lock+0x2c/0x110 [ 699.274548] ? __fget_files+0x296/0x480 [ 699.275143] ? __fget_light+0xea/0x280 [ 699.275690] __sys_sendmsg+0xe5/0x1b0 [ 699.276220] ? __sys_sendmsg_sock+0xb0/0xb0 [ 699.276811] ? rcu_read_lock_any_held+0x69/0x90 [ 699.277508] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 699.278278] ? syscall_enter_from_user_mode+0x1d/0x50 [ 699.279193] ? trace_hardirqs_on+0x5b/0x180 [ 699.279804] do_syscall_64+0x33/0x40 [ 699.280356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 699.281104] RIP: 0033:0x7f406e572b19 [ 699.281642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.284171] RSP: 002b:00007f406bae8188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 699.285302] RAX: ffffffffffffffda RBX: 00007f406e685f60 RCX: 00007f406e572b19 [ 699.286261] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 699.287257] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.288293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.289287] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 09:57:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-'], 0x28}}, 0x0) 09:57:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) (fail_nth: 16) [ 699.356309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 699.366378] FAULT_INJECTION: forcing a failure. [ 699.366378] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.370073] CPU: 0 PID: 5736 Comm: syz-executor.5 Not tainted 5.10.123 #1 [ 699.372070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 699.374240] Call Trace: [ 699.374832] dump_stack+0x107/0x163 [ 699.375367] should_fail.cold+0x5/0xa [ 699.376839] _copy_to_user+0x2e/0x180 [ 699.377575] simple_read_from_buffer+0xcc/0x160 [ 699.378325] proc_fail_nth_read+0x194/0x220 [ 699.379122] ? proc_sessionid_read+0x220/0x220 [ 699.380085] ? security_file_permission+0x24e/0x570 [ 699.381138] ? perf_trace_initcall_start+0x111/0x370 [ 699.382002] ? proc_sessionid_read+0x220/0x220 [ 699.382801] vfs_read+0x228/0x580 [ 699.383662] ksys_read+0x12d/0x250 [ 699.384210] ? __ia32_sys_pwrite64+0x230/0x230 [ 699.385018] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 699.386114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 699.387355] do_syscall_64+0x33/0x40 [ 699.387934] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 699.388736] RIP: 0033:0x7f406e52569c [ 699.389372] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 699.392072] RSP: 002b:00007f406bae8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 699.393245] RAX: ffffffffffffffda RBX: 0000000000000028 RCX: 00007f406e52569c [ 699.394507] RDX: 000000000000000f RSI: 00007f406bae81e0 RDI: 0000000000000005 [ 699.395712] RBP: 00007f406bae81d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.397194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.398263] R13: 00007ffdfcab8b3f R14: 00007f406bae8300 R15: 0000000000022000 [ 699.399611] hpet: Lost 1 RTC interrupts [ 714.068981] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:58:07 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00a0f2a36fe4c2d41defcb5df00f47f27d95337e28850352614ada45d18c3bb45cc11d2d09f6b742eebf68bda8d3c98daae6728eb2b98f4f0954e39212b404f75672254dd395eecfcaf02df4f2fa0a2d6f38d9e56dd856bc0b9d41a435acba90ef0ebef6f2e3d0e471eeeeb419c93e4bef2505d26f6bb8d2de"]) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) truncate(0x0, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = fsmount(r0, 0x0, 0x85) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) sendmsg$NL80211_CMD_GET_COALESCE(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, r4, 0x220, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void, @void}}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r5, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r5, &(0x7f0000000240)=""/245, 0xf5) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfdef) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000003c0)={0x10001, 0x9}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 09:58:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-'], 0x28}}, 0x0) 09:58:07 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) 09:58:07 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0}], 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x8, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x10c) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x6000, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 09:58:07 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:58:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) 09:58:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 722.823155] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:58:07 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:07 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 09:58:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-\x00'], 0x28}}, 0x0) 09:58:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000004c0)=""/113) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/212, 0xd4}, {&(0x7f0000000000)=""/22, 0x16}, {&(0x7f00000002c0)=""/86, 0x56}, {&(0x7f0000000340)=""/65, 0x41}, {&(0x7f00000003c0)=""/100, 0x64}], 0x5, 0x8, 0x6) 09:58:07 executing program 4: ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000580)) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f00000001c0)=[0x0], 0x1}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x1000) r1 = fsopen(&(0x7f0000000480)='fuseblk\x00', 0x0) io_submit(0x0, 0x4, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0xfff7, r0, &(0x7f0000000040)="6f7289783cbed42c9a0b4a0a3c5faa945324e3ae8d6cf08875aded1e90f7a7388b3ff2e5a1a8e4675321575669a9a171c72a28a679543cf5534963db1b833c46378ae1f05ec0fd572b41481eff80a001f9bbd80838e432e968decd3bac9aa8852032b5f64d7a", 0x66, 0x5be, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x1, 0xffffffffffffffff, &(0x7f0000000280)="1ae0608a4732b17584dd086814121e30f1f6735c16ff42b17843e25838cfdb9a0c9308b2065d781266b7a1013d09ba9ce1a3d642b5268ddc69588c93a90178a4b388b37319880de8a048a3757c86d16e9326144962ef243e477fa2f4a60ffac6ea52d8126cc887488850b0a47bad842c673590f200ebd08791f39b9bd9a847428f63e03cd9759c68140c4af02315fe34577d997696b660c008ffb027aed5a206e5073c9d36f650f5b2722c0c6bab43f416309d3ca214cdfa", 0xb8, 0x6f9f, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x2c37, 0xffffffffffffffff, &(0x7f0000000380)="d720de7529ab261bb08f66a79e9ab7056bcf76122431c7da267fa74816ea0bb7cb6a59e85c64600be71ef80acea584fabedb8e056826de4fffbe6aaa2b713a600a2dddd55d55ed096e416ca8a7caf45305cc43a907e84745e7d4c162dc74345761bf2cf9481c8c23193bda4dd072b2b2f3f0c7c5c465abb9724995e6eff160f6e58049009eb047fcb5e4e62e13147ab8f6eb6db2e9ca77d3aee1bbac504b2b54117f66a216802b84747c6b973fa18774a0580d6ac8abd3f83f6357534446", 0xbe, 0x8, 0x0, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x7, r1, &(0x7f00000004c0)="81665dc08c74e5c3", 0x8, 0x1, 0x0, 0x1}]) 09:58:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:58:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-\x00'], 0x28}}, 0x0) [ 723.007459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:58:07 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 723.027657] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 739.542991] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:58:39 executing program 0: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$CDROMRESET(r0, 0x5312) ioctl$SG_GET_RESERVED_SIZE(r0, 0x1279, &(0x7f00000002c0)) r1 = timerfd_create(0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000300)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3f, "e7bb90aafc5d10"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f0000001300)={r2, 0x0, "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", "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"}) 09:58:39 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00-\x00'], 0x28}}, 0x0) 09:58:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:58:39 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0xb45896c, 0x20000) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:58:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x84) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x6212, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xfdef) unshare(0x28020600) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x100, 0x0) unshare(0x80000) 09:58:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) 09:58:39 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 755.062970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 755.113991] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:58:39 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 755.289421] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 755.293710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:58:39 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 755.386448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:58:39 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 1) [ 755.407601] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 755.435218] FAULT_INJECTION: forcing a failure. [ 755.435218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.438517] CPU: 0 PID: 5836 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 755.441224] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 755.445126] Call Trace: [ 755.445545] dump_stack+0x107/0x163 [ 755.446155] should_fail.cold+0x5/0xa [ 755.446722] _copy_from_user+0x2e/0x1b0 [ 755.447347] __copy_msghdr_from_user+0x91/0x4b0 [ 755.448060] ? __ia32_sys_shutdown+0x70/0x70 [ 755.448711] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.449555] ? __lock_acquire+0xbb1/0x5b00 [ 755.450850] sendmsg_copy_msghdr+0xa1/0x160 [ 755.452000] ? __ia32_sys_recvmmsg+0x260/0x260 [ 755.452739] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.454498] ? SOFTIRQ_verbose+0x10/0x10 [ 755.455538] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.456472] ? SOFTIRQ_verbose+0x10/0x10 [ 755.457264] ___sys_sendmsg+0xc6/0x170 [ 755.458400] ? sendmsg_copy_msghdr+0x160/0x160 [ 755.459120] ? __fget_files+0x26d/0x480 [ 755.459911] ? lock_downgrade+0x6d0/0x6d0 [ 755.460912] ? find_held_lock+0x2c/0x110 [ 755.461553] ? __fget_files+0x296/0x480 [ 755.462366] ? __fget_light+0xea/0x280 [ 755.463059] __sys_sendmsg+0xe5/0x1b0 [ 755.463657] ? __sys_sendmsg_sock+0xb0/0xb0 [ 755.464353] ? rcu_read_lock_any_held+0x69/0x90 [ 755.465124] ? fput_many+0x2f/0x1a0 [ 755.465768] ? ksys_write+0x1a5/0x250 [ 755.466695] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 755.467631] ? syscall_enter_from_user_mode+0x1d/0x50 [ 755.468448] ? trace_hardirqs_on+0x5b/0x180 [ 755.469125] do_syscall_64+0x33/0x40 [ 755.469810] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.470827] RIP: 0033:0x7ff54c935b19 [ 755.471744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.475312] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 755.476826] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 755.478835] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 755.481520] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.484972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 755.488363] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 755.495138] hpet: Lost 2 RTC interrupts 09:58:39 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 755.593160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 755.607901] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:58:40 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:58:40 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 2) [ 755.705267] FAULT_INJECTION: forcing a failure. [ 755.705267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.707474] CPU: 1 PID: 5847 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 755.708613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 755.710470] Call Trace: [ 755.710901] dump_stack+0x107/0x163 [ 755.711468] should_fail.cold+0x5/0xa [ 755.712044] _copy_from_user+0x2e/0x1b0 [ 755.712686] iovec_from_user+0x139/0x3f0 [ 755.713310] __import_iovec+0x67/0x590 [ 755.714381] ? __ia32_sys_shutdown+0x70/0x70 [ 755.715709] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.716524] import_iovec+0x83/0xb0 [ 755.717237] sendmsg_copy_msghdr+0x12d/0x160 [ 755.717927] ? __ia32_sys_recvmmsg+0x260/0x260 [ 755.718589] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.719348] ? lock_downgrade+0x6d0/0x6d0 [ 755.719968] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 755.720769] ? SOFTIRQ_verbose+0x10/0x10 [ 755.721379] ___sys_sendmsg+0xc6/0x170 [ 755.722107] ? sendmsg_copy_msghdr+0x160/0x160 [ 755.722984] ? __fget_files+0x26d/0x480 [ 755.723582] ? lock_downgrade+0x6d0/0x6d0 [ 755.724207] ? find_held_lock+0x2c/0x110 [ 755.724807] ? __fget_files+0x296/0x480 [ 755.725524] ? __fget_light+0xea/0x280 [ 755.726246] __sys_sendmsg+0xe5/0x1b0 [ 755.726816] ? __sys_sendmsg_sock+0xb0/0xb0 [ 755.727456] ? rcu_read_lock_any_held+0x69/0x90 [ 755.728225] ? fput_many+0x2f/0x1a0 [ 755.729282] ? ksys_write+0x1a5/0x250 [ 755.729860] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 755.730685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 755.731435] ? trace_hardirqs_on+0x5b/0x180 [ 755.732049] do_syscall_64+0x33/0x40 [ 755.732810] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 755.734240] RIP: 0033:0x7ff54c935b19 [ 755.734766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 755.737824] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 755.739565] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 755.741114] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 755.742179] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 755.743188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 755.744237] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 09:58:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 772.224736] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:59:04 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 3) [ 780.413613] FAULT_INJECTION: forcing a failure. [ 780.413613] name failslab, interval 1, probability 0, space 0, times 0 [ 780.415422] CPU: 1 PID: 5862 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 780.416416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 780.418043] Call Trace: [ 780.418452] dump_stack+0x107/0x163 [ 780.418970] should_fail.cold+0x5/0xa [ 780.419506] ? __alloc_skb+0x6d/0x620 [ 780.420065] should_failslab+0x5/0x10 [ 780.420824] kmem_cache_alloc_node+0x55/0x370 [ 780.421516] __alloc_skb+0x6d/0x620 [ 780.422140] netlink_sendmsg+0x98a/0xdf0 [ 780.422924] ? netlink_unicast+0x7e0/0x7e0 [ 780.423631] ? netlink_unicast+0x7e0/0x7e0 [ 780.424304] sock_sendmsg+0x150/0x190 [ 780.424923] ____sys_sendmsg+0x709/0x870 [ 780.425573] ? kernel_sendmsg+0x50/0x50 [ 780.426204] ? __ia32_sys_recvmmsg+0x260/0x260 [ 780.426945] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 780.427780] ? lock_downgrade+0x6d0/0x6d0 [ 780.428082] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 780.428443] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 780.430691] ? SOFTIRQ_verbose+0x10/0x10 [ 780.431276] ___sys_sendmsg+0xf3/0x170 [ 780.431824] ? sendmsg_copy_msghdr+0x160/0x160 [ 780.432480] ? lock_downgrade+0x6d0/0x6d0 [ 780.433077] ? find_held_lock+0x2c/0x110 [ 780.433661] ? __fget_files+0x296/0x480 [ 780.434252] ? __fget_light+0xea/0x280 [ 780.434881] __sys_sendmsg+0xe5/0x1b0 [ 780.435466] ? __sys_sendmsg_sock+0xb0/0xb0 [ 780.436250] ? rcu_read_lock_any_held+0x69/0x90 [ 780.436964] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 780.437719] ? syscall_enter_from_user_mode+0x1d/0x50 [ 780.438480] ? trace_hardirqs_on+0x5b/0x180 [ 780.439126] do_syscall_64+0x33/0x40 [ 780.439668] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 780.440459] RIP: 0033:0x7ff54c935b19 [ 780.441033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 780.443889] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 780.445049] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 780.446140] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 780.447250] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 780.448310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:59:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) 09:59:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:59:04 executing program 3: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100361f18004f1f2cdb70e21d8ed708b45b430a000039acda280b39ec3250807d998f2787d5761967be952688fcf1d344acea842b72e2510619ba961431d48b0b5108861ed9a57bf61db32e579f26", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000280)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000011c0)={0x0, 0x9, 0x6, 0x3, 0x3475}) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) [ 780.449839] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000080)={0x5, 0x10e0, &(0x7f0000001300)="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"}) read(r2, &(0x7f00000000c0)=""/248, 0xf8) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000001200)='ns/pid\x00') ioctl$F2FS_IOC_PRECACHE_EXTENTS(r3, 0xf50f, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2, {0x3e0000}}, './file0\x00'}) ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="00f50000070000002efbaed86e42a89f1bf4840380be442f05006c653000"]) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f0000001280)=""/80) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x8080, 0x0) 09:59:04 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:59:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) 09:59:04 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:59:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 780.459010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:04 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x840) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 09:59:04 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 4) 09:59:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 780.570379] FAULT_INJECTION: forcing a failure. [ 780.570379] name failslab, interval 1, probability 0, space 0, times 0 [ 780.572306] CPU: 1 PID: 5893 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 780.573375] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 780.575127] Call Trace: [ 780.575545] dump_stack+0x107/0x163 [ 780.576101] should_fail.cold+0x5/0xa [ 780.576713] ? create_object.isra.0+0x3a/0xa20 [ 780.577566] should_failslab+0x5/0x10 [ 780.578125] kmem_cache_alloc+0x5b/0x350 [ 780.578744] create_object.isra.0+0x3a/0xa20 [ 780.579376] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 780.580125] kmem_cache_alloc_node+0x169/0x370 [ 780.580809] __alloc_skb+0x6d/0x620 [ 780.581338] netlink_sendmsg+0x98a/0xdf0 [ 780.581908] ? netlink_unicast+0x7e0/0x7e0 [ 780.582603] ? netlink_unicast+0x7e0/0x7e0 [ 780.583211] sock_sendmsg+0x150/0x190 [ 780.583784] ____sys_sendmsg+0x709/0x870 [ 780.584378] ? kernel_sendmsg+0x50/0x50 [ 780.584917] ? __ia32_sys_recvmmsg+0x260/0x260 [ 780.585606] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 780.586414] ? lock_downgrade+0x6d0/0x6d0 [ 780.587021] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 780.587789] ? SOFTIRQ_verbose+0x10/0x10 [ 780.588418] ___sys_sendmsg+0xf3/0x170 [ 780.589006] ? sendmsg_copy_msghdr+0x160/0x160 [ 780.589710] ? lock_downgrade+0x6d0/0x6d0 [ 780.590384] ? find_held_lock+0x2c/0x110 [ 780.590992] ? __fget_files+0x296/0x480 [ 780.591575] ? __fget_light+0xea/0x280 [ 780.592124] __sys_sendmsg+0xe5/0x1b0 [ 780.592240] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 780.592721] ? __sys_sendmsg_sock+0xb0/0xb0 [ 780.592734] ? rcu_read_lock_any_held+0x69/0x90 [ 780.592759] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 780.592774] ? syscall_enter_from_user_mode+0x1d/0x50 [ 780.592787] ? trace_hardirqs_on+0x5b/0x180 [ 780.592800] do_syscall_64+0x33/0x40 [ 780.592815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 780.592827] RIP: 0033:0x7ff54c935b19 [ 780.592848] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 780.592854] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 780.592869] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 780.592876] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 780.592883] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 780.592889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 780.592895] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 09:59:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:05 executing program 1: clone3(&(0x7f00000008c0)={0x5040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 780.632423] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 780.651138] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:59:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 780.696762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 780.702767] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:59:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 5) 09:59:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 780.757674] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 780.767059] FAULT_INJECTION: forcing a failure. [ 780.767059] name failslab, interval 1, probability 0, space 0, times 0 [ 780.768943] CPU: 1 PID: 5913 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 780.770314] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 780.771936] Call Trace: [ 780.772355] dump_stack+0x107/0x163 [ 780.772896] should_fail.cold+0x5/0xa [ 780.773478] should_failslab+0x5/0x10 [ 780.774084] __kmalloc_node_track_caller+0x74/0x3f0 [ 780.774917] ? netlink_sendmsg+0x98a/0xdf0 [ 780.775555] __alloc_skb+0xb1/0x620 [ 780.776085] netlink_sendmsg+0x98a/0xdf0 [ 780.776617] ? netlink_unicast+0x7e0/0x7e0 [ 780.777202] ? netlink_unicast+0x7e0/0x7e0 [ 780.777753] sock_sendmsg+0x150/0x190 [ 780.778360] ____sys_sendmsg+0x709/0x870 [ 780.778950] ? kernel_sendmsg+0x50/0x50 [ 780.779506] ? __ia32_sys_recvmmsg+0x260/0x260 [ 780.780367] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 780.781120] ? lock_downgrade+0x6d0/0x6d0 [ 780.781694] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 780.782436] ? SOFTIRQ_verbose+0x10/0x10 [ 780.783003] ___sys_sendmsg+0xf3/0x170 [ 780.783543] ? sendmsg_copy_msghdr+0x160/0x160 [ 780.784187] ? lock_downgrade+0x6d0/0x6d0 [ 780.784780] ? find_held_lock+0x2c/0x110 [ 780.785377] ? __fget_files+0x296/0x480 [ 780.785949] ? __fget_light+0xea/0x280 [ 780.786533] __sys_sendmsg+0xe5/0x1b0 [ 780.787027] ? __sys_sendmsg_sock+0xb0/0xb0 [ 780.787631] ? rcu_read_lock_any_held+0x69/0x90 [ 780.788290] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 780.789017] ? syscall_enter_from_user_mode+0x1d/0x50 [ 780.789755] ? trace_hardirqs_on+0x5b/0x180 [ 780.790416] do_syscall_64+0x33/0x40 [ 780.790923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 780.791627] RIP: 0033:0x7ff54c935b19 [ 780.792182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 780.794941] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 780.796134] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 780.797151] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 780.798141] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 780.799156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 780.800168] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 795.460168] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:59:28 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x2, 0x1000, &(0x7f00000001c0)="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"}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000039c0)={0x17, 0x25, &(0x7f0000003980)="f7e67f27ca13c4b1032387d90da4a50ab6035f006242e15686a0a310a6b1e23f27940fa773"}) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000038c0)=""/175) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x4, 0x301081) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000003880)={0x2, 0xf2, &(0x7f0000003780)="fb70c43d0fd0f167fb4d8bf7a4ab16e7b73c399a733a5e208fb880371a474b331031e0b27933afd9a4e63bb9df80f34942de84796dca3f981867bfc894aa809c55aea1f6ba0bdbc3733a062dedd9c412328ea5d71e3f9f2be0b9eac0c03c5aaac2f5001394dea12ad2008c75fea18104582958e636ffbe4f2a7cc2eae42d4fe50cf4aaedd4add2cda03842a4ed204944ad4dab6967f4a4a50b0e171393b2cb173fc39a1574feae8d15e0fa7a0ae91f02660ccf4e4c015ba64078e41a88201189d2c1a43dfffb7d4a80a73559413c64601532541c2c91ec06a40bab71a5e78e0b2cd4741815162f2fef1eff1d882206b45e49"}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000003680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000011c0)=@qipcrtr, 0x80, &(0x7f0000002240)=[{&(0x7f0000003740)=""/43, 0x2b}, {&(0x7f0000001240)=""/4096, 0x1000}], 0x2, &(0x7f0000002280)=""/188, 0xbc}, 0xff}, {{&(0x7f0000002340)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000003600)=[{&(0x7f00000023c0)=""/217, 0xd9}, {&(0x7f00000024c0)=""/96, 0x60}, {&(0x7f0000002540)=""/32, 0x20}, {&(0x7f0000002580)=""/57, 0x39}, {&(0x7f00000025c0)=""/4096, 0x1000}, {&(0x7f00000035c0)=""/59, 0x3b}], 0x6}, 0x7}], 0x3, 0x0, 0x0) read(r2, &(0x7f0000000080)=""/244, 0xf4) 09:59:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 09:59:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:59:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 6) 09:59:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:59:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:59:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) [ 803.848250] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 803.858411] FAULT_INJECTION: forcing a failure. [ 803.858411] name failslab, interval 1, probability 0, space 0, times 0 [ 803.860954] CPU: 1 PID: 5930 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 803.862412] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 803.864863] Call Trace: [ 803.865439] dump_stack+0x107/0x163 [ 803.866228] should_fail.cold+0x5/0xa [ 803.867075] ? create_object.isra.0+0x3a/0xa20 [ 803.868060] should_failslab+0x5/0x10 [ 803.868883] kmem_cache_alloc+0x5b/0x350 [ 803.869759] create_object.isra.0+0x3a/0xa20 [ 803.870711] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 803.871795] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 803.872878] ? netlink_sendmsg+0x98a/0xdf0 [ 803.873787] __alloc_skb+0xb1/0x620 [ 803.874664] netlink_sendmsg+0x98a/0xdf0 [ 803.875540] ? netlink_unicast+0x7e0/0x7e0 [ 803.876450] ? netlink_unicast+0x7e0/0x7e0 [ 803.877353] sock_sendmsg+0x150/0x190 [ 803.878166] ____sys_sendmsg+0x709/0x870 [ 803.879052] ? kernel_sendmsg+0x50/0x50 [ 803.879895] ? __ia32_sys_recvmmsg+0x260/0x260 [ 803.880871] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 803.881990] ? lock_downgrade+0x6d0/0x6d0 [ 803.882884] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 803.884001] ? SOFTIRQ_verbose+0x10/0x10 [ 803.884869] ___sys_sendmsg+0xf3/0x170 [ 803.885700] ? sendmsg_copy_msghdr+0x160/0x160 [ 803.886721] ? lock_downgrade+0x6d0/0x6d0 [ 803.887606] ? find_held_lock+0x2c/0x110 [ 803.888477] ? __fget_files+0x296/0x480 [ 803.889331] ? __fget_light+0xea/0x280 [ 803.890230] __sys_sendmsg+0xe5/0x1b0 [ 803.891045] ? __sys_sendmsg_sock+0xb0/0xb0 [ 803.891961] ? rcu_read_lock_any_held+0x69/0x90 [ 803.892970] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 803.894086] ? syscall_enter_from_user_mode+0x1d/0x50 [ 803.895192] ? trace_hardirqs_on+0x5b/0x180 [ 803.896116] do_syscall_64+0x33/0x40 [ 803.896908] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 803.897999] RIP: 0033:0x7ff54c935b19 [ 803.898813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 803.902751] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 803.904371] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 803.905971] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 803.907508] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 803.909033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.910559] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 803.912285] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 803.913110] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:59:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) [ 804.019256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:59:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:59:28 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:59:28 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 7) 09:59:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 804.202683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 804.213613] FAULT_INJECTION: forcing a failure. [ 804.213613] name failslab, interval 1, probability 0, space 0, times 0 [ 804.216217] CPU: 0 PID: 5963 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 804.217741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 804.220226] Call Trace: [ 804.220812] dump_stack+0x107/0x163 [ 804.221601] should_fail.cold+0x5/0xa [ 804.222425] ? __skb_ext_alloc+0x19/0x80 [ 804.223318] should_failslab+0x5/0x10 [ 804.224147] kmem_cache_alloc+0x5b/0x350 [ 804.225031] __skb_ext_alloc+0x19/0x80 [ 804.225860] skb_ext_add+0x504/0x670 [ 804.226677] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 804.227835] __alloc_skb+0x3c1/0x620 [ 804.228653] netlink_sendmsg+0x98a/0xdf0 [ 804.229545] ? netlink_unicast+0x7e0/0x7e0 [ 804.230501] ? netlink_unicast+0x7e0/0x7e0 [ 804.231447] sock_sendmsg+0x150/0x190 [ 804.232271] ____sys_sendmsg+0x709/0x870 [ 804.233153] ? kernel_sendmsg+0x50/0x50 [ 804.234016] ? __ia32_sys_recvmmsg+0x260/0x260 [ 804.235029] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 804.236195] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 804.237343] ? SOFTIRQ_verbose+0x10/0x10 [ 804.238247] ___sys_sendmsg+0xf3/0x170 [ 804.239130] ? sendmsg_copy_msghdr+0x160/0x160 [ 804.240154] ? lock_downgrade+0x6d0/0x6d0 [ 804.241070] ? find_held_lock+0x2c/0x110 [ 804.241995] ? __fget_files+0x296/0x480 [ 804.242936] ? __fget_light+0xea/0x280 [ 804.243816] __sys_sendmsg+0xe5/0x1b0 [ 804.244665] ? __sys_sendmsg_sock+0xb0/0xb0 [ 804.245609] ? rcu_read_lock_any_held+0x69/0x90 [ 804.246692] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 804.247842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 804.248969] ? trace_hardirqs_on+0x5b/0x180 [ 804.249926] do_syscall_64+0x33/0x40 [ 804.250763] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 804.251908] RIP: 0033:0x7ff54c935b19 [ 804.252740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 804.256880] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 804.258594] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 804.260224] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 804.261812] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 804.263415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 804.265001] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 804.266900] hpet: Lost 3 RTC interrupts [ 804.270828] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 804.277210] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 09:59:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 818.377902] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 09:59:51 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 09:59:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) 09:59:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 09:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:59:51 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 8) 09:59:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) 09:59:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0xf6, 0xffd30cb640dcbb42) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x2, 0xc, 0x7, 0x90000, "c2b3c6b3e224146bfcc257127bff1868c631ed3ef735715efc7fec4f4a79ec7a"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:51 executing program 7: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 826.991521] FAULT_INJECTION: forcing a failure. [ 826.991521] name failslab, interval 1, probability 0, space 0, times 0 [ 826.993294] CPU: 1 PID: 5994 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 826.994007] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 826.994320] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 826.994338] Call Trace: [ 827.002356] dump_stack+0x107/0x163 [ 827.002853] should_fail.cold+0x5/0xa [ 827.003437] ? create_object.isra.0+0x3a/0xa20 [ 827.004116] should_failslab+0x5/0x10 [ 827.004664] kmem_cache_alloc+0x5b/0x350 [ 827.005225] create_object.isra.0+0x3a/0xa20 [ 827.005847] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 827.006624] kmem_cache_alloc+0x159/0x350 [ 827.007618] __skb_ext_alloc+0x19/0x80 [ 827.008835] skb_ext_add+0x504/0x670 [ 827.010266] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 827.011547] __alloc_skb+0x3c1/0x620 [ 827.012102] netlink_sendmsg+0x98a/0xdf0 [ 827.012839] ? netlink_unicast+0x7e0/0x7e0 [ 827.013540] ? netlink_unicast+0x7e0/0x7e0 [ 827.014125] sock_sendmsg+0x150/0x190 [ 827.014724] ____sys_sendmsg+0x709/0x870 [ 827.015817] ? kernel_sendmsg+0x50/0x50 [ 827.016780] ? __ia32_sys_recvmmsg+0x260/0x260 [ 827.017819] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 827.020047] ? lock_downgrade+0x6d0/0x6d0 [ 827.021744] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 827.024222] ? SOFTIRQ_verbose+0x10/0x10 [ 827.026737] ___sys_sendmsg+0xf3/0x170 [ 827.028424] ? sendmsg_copy_msghdr+0x160/0x160 [ 827.029132] ? lock_downgrade+0x6d0/0x6d0 [ 827.029775] ? find_held_lock+0x2c/0x110 [ 827.032041] ? __fget_files+0x296/0x480 [ 827.032821] ? __fget_light+0xea/0x280 [ 827.033417] __sys_sendmsg+0xe5/0x1b0 [ 827.034082] ? __sys_sendmsg_sock+0xb0/0xb0 [ 827.034701] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 827.035452] ? rcu_read_lock_any_held+0x69/0x90 [ 827.035491] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 827.039549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 827.040413] ? trace_hardirqs_on+0x5b/0x180 [ 827.041041] do_syscall_64+0x33/0x40 [ 827.041578] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 827.042273] RIP: 0033:0x7ff54c935b19 [ 827.042781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.045587] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 827.047518] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 827.048730] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 827.049856] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 827.050902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 827.052037] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 827.053451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 09:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 09:59:51 executing program 7: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 09:59:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 09:59:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000080)={0x4, 0xe7, &(0x7f00000001c0)="7c5ae1ddb13bf6469f5c2ca0ad14e426e32332ee4e037ef767345bc20cbea65c417e1f95966e3238f3e3a102e8dc0fb3e73336095ff986519d7966c4320c76740142c80d1bb171a3da6fbb3b6c7783d55c8eb69872c2c939815317763a9c34a1e02ffa1124010806433325f2c4eaa83ac359a0f002cadf8e8cede27afa40fb28d499168134d42a74cd7f658afcf31c0bb505c9ca3c8a913c9f281a6a6a0f0d4ca6f7b25d21e1c6901c028889b1501f1da7e075202a4496551d777cdd932b9814f8f9aceddc64323fc7a850f5da1e476ee56fcb1c43946803a047b395479b7a62db99105d7aa824"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000500)=0x0) r3 = getpgrp(0xffffffffffffffff) r4 = getpid() setpriority(0x1, r4, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)=0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000580)=0x0) recvmsg$unix(r1, &(0x7f0000000c00)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000680)=""/212, 0xd4}, {&(0x7f0000000780)=""/72, 0x48}, {&(0x7f0000000800)=""/59, 0x3b}, {&(0x7f0000000840)=""/5, 0x5}, {&(0x7f0000000880)=""/6, 0x6}, {&(0x7f00000008c0)=""/202, 0xca}, {&(0x7f00000009c0)=""/84, 0x54}], 0x7, &(0x7f0000000ac0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x138}, 0x40002101) clone3(&(0x7f0000000c40)={0x2000000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), {0x5}, &(0x7f0000000380)=""/107, 0x6b, &(0x7f0000000400)=""/239, &(0x7f00000005c0)=[r2, r3, r4, 0x0, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, r6], 0x9, {r7}}, 0x58) [ 827.266706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 827.305904] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 841.685455] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 851.432761] FAULT_INJECTION: forcing a failure. [ 851.432761] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 851.434526] CPU: 1 PID: 6042 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 851.435541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 851.437362] Call Trace: [ 851.437733] dump_stack+0x107/0x163 [ 851.438234] should_fail.cold+0x5/0xa [ 851.438759] _copy_from_iter_full+0x1ff/0x940 [ 851.439434] ? __check_object_size+0x319/0x440 [ 851.440393] netlink_sendmsg+0x86b/0xdf0 [ 851.440942] ? netlink_unicast+0x7e0/0x7e0 [ 851.441518] ? netlink_unicast+0x7e0/0x7e0 10:00:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000001c0)=""/224) read(r0, &(0x7f00000000c0)=""/248, 0xf8) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x240, 0x0) 10:00:15 executing program 7: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:00:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r2 = getpid() setpriority(0x1, r2, 0x0) kcmp(0xffffffffffffffff, r2, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r4, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x509100, 0x26) 10:00:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:00:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:00:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 9) 10:00:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:00:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) [ 851.442328] sock_sendmsg+0x150/0x190 [ 851.442851] ____sys_sendmsg+0x709/0x870 [ 851.443430] ? kernel_sendmsg+0x50/0x50 [ 851.443980] ? __ia32_sys_recvmmsg+0x260/0x260 [ 851.444564] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 851.445315] ? lock_downgrade+0x6d0/0x6d0 [ 851.445900] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 851.446633] ? SOFTIRQ_verbose+0x10/0x10 [ 851.447207] ___sys_sendmsg+0xf3/0x170 [ 851.447799] ? sendmsg_copy_msghdr+0x160/0x160 [ 851.448447] ? lock_downgrade+0x6d0/0x6d0 [ 851.449051] ? find_held_lock+0x2c/0x110 [ 851.449618] ? __fget_files+0x296/0x480 [ 851.450162] ? __fget_light+0xea/0x280 [ 851.450701] __sys_sendmsg+0xe5/0x1b0 [ 851.451237] ? __sys_sendmsg_sock+0xb0/0xb0 [ 851.451875] ? rcu_read_lock_any_held+0x69/0x90 [ 851.452517] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 851.453465] ? syscall_enter_from_user_mode+0x1d/0x50 [ 851.454194] ? trace_hardirqs_on+0x5b/0x180 [ 851.454802] do_syscall_64+0x33/0x40 [ 851.455373] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 851.456114] RIP: 0033:0x7ff54c935b19 [ 851.456643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 851.459262] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.460359] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 851.461341] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 851.462407] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 851.463427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 851.464443] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 851.499757] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 851.537436] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) ioctl$HIDIOCGSTRING(r2, 0x81044804, &(0x7f00000001c0)={0x5d, "14b6f079b0bbcf233cd429c8e2c5f28595b34f991bbfde9367c66021ad16043c8d23f51e9c9b0ac9ae75448e5453093f6984bfed38c9f95f71566e28cf14eda19702c1f98ea8f4d36d2a6901a0ba4d121a2923d61643c44f8ec5375bee"}) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:00:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:00:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 10) 10:00:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:00:16 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 851.704802] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 851.706771] FAULT_INJECTION: forcing a failure. [ 851.706771] name failslab, interval 1, probability 0, space 0, times 0 [ 851.708613] CPU: 0 PID: 6065 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 851.709651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 851.711459] Call Trace: [ 851.711892] dump_stack+0x107/0x163 [ 851.712510] should_fail.cold+0x5/0xa [ 851.713278] ? __alloc_skb+0x6d/0x620 [ 851.713947] ? __alloc_skb+0x6d/0x620 [ 851.714570] should_failslab+0x5/0x10 [ 851.715137] kmem_cache_alloc_node+0x55/0x370 [ 851.715891] __alloc_skb+0x6d/0x620 [ 851.716456] netlink_ack+0x1ed/0xab0 [ 851.717025] ? netlink_sendmsg+0xdf0/0xdf0 [ 851.717645] ? lock_acquire+0x197/0x490 [ 851.718228] ? netlink_deliver_tap+0xf4/0xc40 [ 851.719047] netlink_rcv_skb+0x348/0x430 [ 851.720021] ? rtnetlink_put_metrics+0x510/0x510 [ 851.721564] ? netlink_ack+0xab0/0xab0 [ 851.722264] ? netlink_deliver_tap+0x1ae/0xc40 [ 851.723063] ? netlink_deliver_tap+0x1c4/0xc40 [ 851.724063] ? is_vmalloc_addr+0x7b/0xb0 [ 851.725850] netlink_unicast+0x53a/0x7e0 [ 851.727347] ? netlink_attachskb+0x810/0x810 [ 851.728147] netlink_sendmsg+0x901/0xdf0 [ 851.728787] ? netlink_unicast+0x7e0/0x7e0 [ 851.729567] ? netlink_unicast+0x7e0/0x7e0 [ 851.730745] sock_sendmsg+0x150/0x190 [ 851.731430] ____sys_sendmsg+0x709/0x870 [ 851.732565] ? kernel_sendmsg+0x50/0x50 [ 851.733222] ? __ia32_sys_recvmmsg+0x260/0x260 [ 851.734006] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 851.735035] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 851.736563] ? SOFTIRQ_verbose+0x10/0x10 [ 851.737392] ___sys_sendmsg+0xf3/0x170 [ 851.738035] ? sendmsg_copy_msghdr+0x160/0x160 [ 851.738711] ? lock_downgrade+0x6d0/0x6d0 [ 851.739404] ? find_held_lock+0x2c/0x110 [ 851.740098] ? __fget_files+0x296/0x480 [ 851.740746] ? __fget_light+0xea/0x280 [ 851.741359] __sys_sendmsg+0xe5/0x1b0 [ 851.741945] ? __sys_sendmsg_sock+0xb0/0xb0 [ 851.742671] ? rcu_read_lock_any_held+0x69/0x90 [ 851.743453] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 851.744569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 851.745323] ? trace_hardirqs_on+0x5b/0x180 [ 851.745967] do_syscall_64+0x33/0x40 [ 851.746529] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 851.747378] RIP: 0033:0x7ff54c935b19 [ 851.747940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 851.750822] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 851.751992] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 851.753552] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 851.754664] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 851.755800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 851.757872] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 851.760192] hpet: Lost 2 RTC interrupts [ 851.800854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 866.112557] kmemleak: 35 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:00:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:00:38 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:00:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:00:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:00:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 11) 10:00:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:00:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x167283) r1 = socket$inet6(0xa, 0x2, 0xa9) recvmmsg(r1, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000040)}], 0x1, &(0x7f0000000280)=""/24, 0x18}, 0xa60}, {{&(0x7f00000002c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000340)=""/137, 0x89}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/40, 0x28}, {&(0x7f00000004c0)=""/144, 0x90}], 0x4, &(0x7f00000005c0)=""/138, 0x8a}, 0x3}], 0x3, 0x40010000, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000000740)={0x1, 'veth0_to_bridge\x00', {}, 0xfff8}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/235, 0xeb) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000080)={0x20, 0xf, 0x8, 0x4, "f56c3cc6f15cd54118d8ec5c41d9a4ff79d30fc916db2164655bce9d3670f7b1"}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r3, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000780)={0xa, 0x4e20, 0x86ac, @loopback, 0x18e5}, 0x1c) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) dup2(r4, r0) 10:00:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 873.886380] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 873.892371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 873.895302] FAULT_INJECTION: forcing a failure. [ 873.895302] name failslab, interval 1, probability 0, space 0, times 0 [ 873.897029] CPU: 1 PID: 6099 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 873.897982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 873.899672] Call Trace: [ 873.900047] dump_stack+0x107/0x163 [ 873.900534] should_fail.cold+0x5/0xa [ 873.901067] ? create_object.isra.0+0x3a/0xa20 [ 873.901721] should_failslab+0x5/0x10 [ 873.902261] kmem_cache_alloc+0x5b/0x350 [ 873.902849] create_object.isra.0+0x3a/0xa20 [ 873.903461] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 873.904212] kmem_cache_alloc_node+0x169/0x370 [ 873.904873] __alloc_skb+0x6d/0x620 [ 873.905386] netlink_ack+0x1ed/0xab0 [ 873.905902] ? netlink_sendmsg+0xdf0/0xdf0 [ 873.906668] ? lock_acquire+0x197/0x490 [ 873.907221] ? netlink_deliver_tap+0xf4/0xc40 [ 873.907917] netlink_rcv_skb+0x348/0x430 [ 873.908539] ? rtnetlink_put_metrics+0x510/0x510 [ 873.909189] ? netlink_ack+0xab0/0xab0 [ 873.909720] ? netlink_deliver_tap+0x1ae/0xc40 [ 873.910350] ? netlink_deliver_tap+0x1c4/0xc40 [ 873.911001] ? is_vmalloc_addr+0x7b/0xb0 [ 873.911650] netlink_unicast+0x53a/0x7e0 [ 873.912249] ? netlink_attachskb+0x810/0x810 [ 873.912887] netlink_sendmsg+0x901/0xdf0 [ 873.913498] ? netlink_unicast+0x7e0/0x7e0 [ 873.914101] ? netlink_unicast+0x7e0/0x7e0 [ 873.914688] sock_sendmsg+0x150/0x190 [ 873.915225] ____sys_sendmsg+0x709/0x870 [ 873.915823] ? kernel_sendmsg+0x50/0x50 [ 873.916365] ? __ia32_sys_recvmmsg+0x260/0x260 [ 873.917011] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 873.917744] ? lock_downgrade+0x6d0/0x6d0 [ 873.918325] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 873.919061] ? SOFTIRQ_verbose+0x10/0x10 [ 873.919676] ___sys_sendmsg+0xf3/0x170 [ 873.920218] ? sendmsg_copy_msghdr+0x160/0x160 [ 873.920857] ? lock_downgrade+0x6d0/0x6d0 [ 873.921458] ? find_held_lock+0x2c/0x110 [ 873.922088] ? __fget_files+0x296/0x480 [ 873.922759] ? __fget_light+0xea/0x280 [ 873.923323] __sys_sendmsg+0xe5/0x1b0 [ 873.923883] ? __sys_sendmsg_sock+0xb0/0xb0 [ 873.924492] ? rcu_read_lock_any_held+0x69/0x90 [ 873.925148] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 873.925896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.926612] ? trace_hardirqs_on+0x5b/0x180 [ 873.927213] do_syscall_64+0x33/0x40 [ 873.927753] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 873.928472] RIP: 0033:0x7ff54c935b19 [ 873.929003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.931580] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 873.932701] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 873.933721] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 873.934723] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.935753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.936987] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 873.953417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 874.015493] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 874.022509] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 12) 10:00:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xb4, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:00:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 874.136683] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 874.145117] FAULT_INJECTION: forcing a failure. [ 874.145117] name failslab, interval 1, probability 0, space 0, times 0 [ 874.146980] CPU: 1 PID: 6119 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 874.148326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 874.150072] Call Trace: [ 874.150499] dump_stack+0x107/0x163 [ 874.151154] should_fail.cold+0x5/0xa [ 874.151771] should_failslab+0x5/0x10 [ 874.152346] __kmalloc_node_track_caller+0x74/0x3f0 [ 874.153073] ? netlink_ack+0x1ed/0xab0 [ 874.153751] __alloc_skb+0xb1/0x620 [ 874.154557] netlink_ack+0x1ed/0xab0 [ 874.155114] ? netlink_sendmsg+0xdf0/0xdf0 [ 874.155886] ? lock_acquire+0x197/0x490 [ 874.156665] ? netlink_deliver_tap+0xf4/0xc40 [ 874.157336] netlink_rcv_skb+0x348/0x430 [ 874.158024] ? rtnetlink_put_metrics+0x510/0x510 [ 874.158906] ? netlink_ack+0xab0/0xab0 [ 874.159592] ? netlink_deliver_tap+0x1ae/0xc40 [ 874.160281] ? netlink_deliver_tap+0x1c4/0xc40 [ 874.160970] ? is_vmalloc_addr+0x7b/0xb0 [ 874.161680] netlink_unicast+0x53a/0x7e0 [ 874.162420] ? netlink_attachskb+0x810/0x810 [ 874.163105] netlink_sendmsg+0x901/0xdf0 [ 874.163752] ? netlink_unicast+0x7e0/0x7e0 [ 874.164502] ? netlink_unicast+0x7e0/0x7e0 [ 874.165146] sock_sendmsg+0x150/0x190 [ 874.165716] ____sys_sendmsg+0x709/0x870 [ 874.166370] ? kernel_sendmsg+0x50/0x50 [ 874.167103] ? __ia32_sys_recvmmsg+0x260/0x260 [ 874.167831] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 874.168669] ? lock_downgrade+0x6d0/0x6d0 [ 874.169281] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 874.170063] ? SOFTIRQ_verbose+0x10/0x10 [ 874.170763] ___sys_sendmsg+0xf3/0x170 [ 874.171398] ? sendmsg_copy_msghdr+0x160/0x160 [ 874.172310] ? lock_downgrade+0x6d0/0x6d0 [ 874.172926] ? find_held_lock+0x2c/0x110 [ 874.173526] ? __fget_files+0x296/0x480 [ 874.174218] ? __fget_light+0xea/0x280 [ 874.174798] __sys_sendmsg+0xe5/0x1b0 [ 874.175372] ? __sys_sendmsg_sock+0xb0/0xb0 [ 874.176135] ? rcu_read_lock_any_held+0x69/0x90 [ 874.176861] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 874.177651] ? syscall_enter_from_user_mode+0x1d/0x50 [ 874.178438] ? trace_hardirqs_on+0x5b/0x180 [ 874.179091] do_syscall_64+0x33/0x40 [ 874.179677] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 874.180449] RIP: 0033:0x7ff54c935b19 [ 874.181011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.183875] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 874.184971] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 874.186052] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 874.187120] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 874.188395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 874.189425] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 874.201329] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 874.206393] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:00:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:00:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:00:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:00:38 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 13) [ 874.332047] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 874.339756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 874.350730] FAULT_INJECTION: forcing a failure. [ 874.350730] name failslab, interval 1, probability 0, space 0, times 0 [ 874.353556] CPU: 0 PID: 6139 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 874.354771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 874.357246] Call Trace: [ 874.357760] dump_stack+0x107/0x163 [ 874.358496] should_fail.cold+0x5/0xa [ 874.359115] ? create_object.isra.0+0x3a/0xa20 [ 874.360092] should_failslab+0x5/0x10 [ 874.360785] kmem_cache_alloc+0x5b/0x350 [ 874.361408] create_object.isra.0+0x3a/0xa20 [ 874.362427] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 874.363295] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 874.364164] ? netlink_ack+0x1ed/0xab0 [ 874.364984] __alloc_skb+0xb1/0x620 [ 874.365650] netlink_ack+0x1ed/0xab0 [ 874.366239] ? netlink_sendmsg+0xdf0/0xdf0 [ 874.366912] ? lock_acquire+0x197/0x490 [ 874.367595] ? netlink_deliver_tap+0xf4/0xc40 [ 874.368481] netlink_rcv_skb+0x348/0x430 [ 874.369097] ? rtnetlink_put_metrics+0x510/0x510 [ 874.369872] ? netlink_ack+0xab0/0xab0 [ 874.370516] ? netlink_deliver_tap+0x1ae/0xc40 [ 874.371597] ? netlink_deliver_tap+0x1c4/0xc40 [ 874.372734] ? is_vmalloc_addr+0x7b/0xb0 [ 874.373636] netlink_unicast+0x53a/0x7e0 [ 874.374481] ? netlink_attachskb+0x810/0x810 [ 874.375163] netlink_sendmsg+0x901/0xdf0 [ 874.375781] ? netlink_unicast+0x7e0/0x7e0 [ 874.376419] ? netlink_unicast+0x7e0/0x7e0 [ 874.377105] sock_sendmsg+0x150/0x190 [ 874.377794] ____sys_sendmsg+0x709/0x870 [ 874.378386] ? kernel_sendmsg+0x50/0x50 [ 874.378994] ? __ia32_sys_recvmmsg+0x260/0x260 [ 874.379780] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 874.380701] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 874.381530] ? SOFTIRQ_verbose+0x10/0x10 [ 874.382156] ___sys_sendmsg+0xf3/0x170 [ 874.382739] ? sendmsg_copy_msghdr+0x160/0x160 [ 874.383396] ? lock_downgrade+0x6d0/0x6d0 [ 874.384126] ? find_held_lock+0x2c/0x110 [ 874.384809] ? __fget_files+0x296/0x480 [ 874.385471] ? __fget_light+0xea/0x280 [ 874.386161] __sys_sendmsg+0xe5/0x1b0 [ 874.386776] ? __sys_sendmsg_sock+0xb0/0xb0 [ 874.387488] ? rcu_read_lock_any_held+0x69/0x90 [ 874.388315] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 874.389204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 874.390052] ? trace_hardirqs_on+0x5b/0x180 [ 874.390760] do_syscall_64+0x33/0x40 [ 874.391358] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 874.396326] RIP: 0033:0x7ff54c935b19 [ 874.396792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 874.399038] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 874.399981] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 874.400847] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 874.401674] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 874.402533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 874.403394] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 874.404745] hpet: Lost 2 RTC interrupts 10:00:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 888.755983] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:01:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 14) [ 896.621919] __nla_validate_parse: 1 callbacks suppressed [ 896.621929] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:01:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x1}) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/84) 10:01:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:01:01 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:01:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:01:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:01:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file1', [{0x20, '*---,'}, {0x20, '\x9a\xf8\xe9f\xfc\xa5$5\x94\xc8\xd3\xf1S\x88\x10\xca/D~b\xfaR\xb1:~6\x8eCh\x01\xc0\xbd\xc7\xda6\xc6\xa2\x19\xc3\xb1\xd0}O\x03\xce\x1e\x12\xe3\x85@\xe9}\xe36\xe9\x99\xc1\xff,\x9a\xc2\xd4n^\xcbWk\x9d\v\x91\xfap\xf4\xcb\x8e\xa8\xeb\x9b\x1b\x9a\xcb\xde\x15\xba\xa0\x9b\x95\xef\x03\xa2\xfc\x057\xdb\x1a\xf0\'&\x87\xe8\x90]D\x9b\xc5\xf3\x15\x7f\xa3s2\x9c\xd9|\x9b4O\xe1\vn\xc1'}, {0x20, '}+'}, {0x20, ',\xdf\xa6\x942\f8\xfc\x11!\xbc\xed\xf7$\xd0P\x1a\xd2v6\xbfn\xe6\x1c\xc3\x02\xc54\xa1E2\x1a!\xa3\f`\xee\xef\xbf\xda\xb4\xab\x06\x88*}Q\x10n;\xfd^\xd5P\xd5;\xfe\x10=\xaf~\xc8%P\xf2\x18\xdb*\xc7\x14\xd7\x8el!\xb4\xdf*\xb5A\x16\xc6\xf7\x1dZXm\xf62\xa8\xa87\xda.\xe87\x7fF\x85'}, {0x20, '\x99\'\x92\xcf\xdczN\xd8w\xd9\xc0\xe8\x90\xcf\xc0\xbd\x86\xa6a\x03\x93N\x91\xc3#\x18jO\x91\x98=\x90\b\xc7\xceu\xc8\x06\x90m\x17\x1df=\xefe\xc5\xc9\xc5\x18\xad\xb1\xef1X\x96 b\xf8\x1bOHcS\xe0ec\x10\x0f\xcc\x01\xd5\xca\xbb\xcd\x1c\x97\x1b\xe5I\xfcw\xe8F\xf9\xc8\xe5T_\xa5uv\x1e\x10\xb7\x9d:\x11}Ql\x84\xdd\xd6g\xc1\v\x93\x94\x7f\xd6B\x13\xf5\xce2\xf7\xe9\xbc`\'\xb5\xcd\xe18&r\xed\x8a\x8e\x158i\x00\xa8\x1f\x8a\\\xff\x05})\xa4\xd6\xa4i\xd6F\xdc\xcf\xaah\xdbX\x9c\xad\x862(\x1f'}, {0x20, '}\t\xfa/&'}, {0x20, '+!}$@,^@}!'}], 0xa, "d676a800de0d21a88b4d9bf94c686dc04133351e2ad66887371ab6dc69bff57d0fd3653fc21e3fa83f9255667cdf2b0c52da3a60ce"}, 0x1d8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 896.634826] FAULT_INJECTION: forcing a failure. [ 896.634826] name failslab, interval 1, probability 0, space 0, times 0 [ 896.636638] CPU: 1 PID: 6154 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 896.637598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 896.637996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 896.639210] Call Trace: [ 896.639235] dump_stack+0x107/0x163 [ 896.639249] should_fail.cold+0x5/0xa [ 896.639270] ? __skb_ext_alloc+0x19/0x80 [ 896.642759] should_failslab+0x5/0x10 [ 896.643293] kmem_cache_alloc+0x5b/0x350 [ 896.643849] __skb_ext_alloc+0x19/0x80 [ 896.644421] skb_ext_add+0x504/0x670 [ 896.644938] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 896.645695] __alloc_skb+0x3c1/0x620 [ 896.646261] netlink_ack+0x1ed/0xab0 [ 896.646876] ? netlink_sendmsg+0xdf0/0xdf0 [ 896.647683] ? lock_acquire+0x197/0x490 [ 896.648367] ? netlink_deliver_tap+0xf4/0xc40 [ 896.649043] netlink_rcv_skb+0x348/0x430 [ 896.649636] ? rtnetlink_put_metrics+0x510/0x510 [ 896.650376] ? netlink_ack+0xab0/0xab0 [ 896.651037] ? netlink_deliver_tap+0x1ae/0xc40 [ 896.652066] ? netlink_deliver_tap+0x1c4/0xc40 [ 896.652749] ? is_vmalloc_addr+0x7b/0xb0 [ 896.653320] netlink_unicast+0x53a/0x7e0 [ 896.653908] ? netlink_attachskb+0x810/0x810 [ 896.653959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 896.654537] netlink_sendmsg+0x901/0xdf0 [ 896.656615] ? netlink_unicast+0x7e0/0x7e0 [ 896.657337] ? netlink_unicast+0x7e0/0x7e0 [ 896.657987] sock_sendmsg+0x150/0x190 [ 896.658680] ____sys_sendmsg+0x709/0x870 [ 896.659280] ? kernel_sendmsg+0x50/0x50 [ 896.659834] ? __ia32_sys_recvmmsg+0x260/0x260 [ 896.660557] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 896.661443] ? lock_downgrade+0x6d0/0x6d0 [ 896.662087] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 10:01:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 896.662863] ? SOFTIRQ_verbose+0x10/0x10 [ 896.663874] ___sys_sendmsg+0xf3/0x170 [ 896.664541] ? sendmsg_copy_msghdr+0x160/0x160 [ 896.665273] ? lock_downgrade+0x6d0/0x6d0 [ 896.665929] ? find_held_lock+0x2c/0x110 [ 896.666566] ? __fget_files+0x296/0x480 [ 896.667174] ? __fget_light+0xea/0x280 [ 896.667776] __sys_sendmsg+0xe5/0x1b0 [ 896.668380] ? __sys_sendmsg_sock+0xb0/0xb0 [ 896.669042] ? rcu_read_lock_any_held+0x69/0x90 [ 896.669803] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 896.670599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 896.671379] ? trace_hardirqs_on+0x5b/0x180 [ 896.672082] do_syscall_64+0x33/0x40 [ 896.672851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 896.673704] RIP: 0033:0x7ff54c935b19 [ 896.674338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 896.677440] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 896.678713] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 896.679879] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 896.680992] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 896.682153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 896.683332] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 10:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:01:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 896.783359] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 896.795658] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:01 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 15) 10:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 896.918346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 896.960508] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 896.970015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 896.975517] FAULT_INJECTION: forcing a failure. [ 896.975517] name failslab, interval 1, probability 0, space 0, times 0 [ 896.977210] CPU: 1 PID: 6190 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 896.978194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 896.979817] Call Trace: [ 896.980228] dump_stack+0x107/0x163 [ 896.980730] should_fail.cold+0x5/0xa [ 896.981262] ? create_object.isra.0+0x3a/0xa20 [ 896.981880] should_failslab+0x5/0x10 [ 896.982401] kmem_cache_alloc+0x5b/0x350 [ 896.982978] create_object.isra.0+0x3a/0xa20 [ 896.983597] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 896.984337] kmem_cache_alloc+0x159/0x350 [ 896.985172] __skb_ext_alloc+0x19/0x80 [ 896.985700] skb_ext_add+0x504/0x670 [ 896.986205] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 896.986935] __alloc_skb+0x3c1/0x620 [ 896.987443] netlink_ack+0x1ed/0xab0 [ 896.988014] ? netlink_sendmsg+0xdf0/0xdf0 [ 896.988588] ? lock_acquire+0x197/0x490 [ 896.989151] ? netlink_deliver_tap+0xf4/0xc40 [ 896.989779] netlink_rcv_skb+0x348/0x430 10:01:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6a8, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 896.990341] ? rtnetlink_put_metrics+0x510/0x510 [ 896.991292] ? netlink_ack+0xab0/0xab0 [ 896.991847] ? netlink_deliver_tap+0x1ae/0xc40 [ 896.992498] ? netlink_deliver_tap+0x1c4/0xc40 [ 896.993154] ? is_vmalloc_addr+0x7b/0xb0 [ 896.993729] netlink_unicast+0x53a/0x7e0 [ 896.994310] ? netlink_attachskb+0x810/0x810 [ 896.994932] netlink_sendmsg+0x901/0xdf0 [ 896.995530] ? netlink_unicast+0x7e0/0x7e0 [ 896.996191] ? netlink_unicast+0x7e0/0x7e0 [ 896.996815] sock_sendmsg+0x150/0x190 [ 896.997374] ____sys_sendmsg+0x709/0x870 [ 896.997951] ? kernel_sendmsg+0x50/0x50 [ 896.998507] ? __ia32_sys_recvmmsg+0x260/0x260 [ 896.999145] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 896.999852] ? lock_downgrade+0x6d0/0x6d0 [ 897.000605] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 897.001319] ? SOFTIRQ_verbose+0x10/0x10 [ 897.001878] ___sys_sendmsg+0xf3/0x170 [ 897.002421] ? sendmsg_copy_msghdr+0x160/0x160 [ 897.003062] ? lock_downgrade+0x6d0/0x6d0 [ 897.003642] ? find_held_lock+0x2c/0x110 [ 897.004272] ? __fget_files+0x296/0x480 [ 897.004832] ? __fget_light+0xea/0x280 [ 897.005354] __sys_sendmsg+0xe5/0x1b0 [ 897.005880] ? __sys_sendmsg_sock+0xb0/0xb0 [ 897.006464] ? rcu_read_lock_any_held+0x69/0x90 [ 897.007162] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 897.007921] ? syscall_enter_from_user_mode+0x1d/0x50 [ 897.008698] ? trace_hardirqs_on+0x5b/0x180 [ 897.009310] do_syscall_64+0x33/0x40 [ 897.009859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 897.010554] RIP: 0033:0x7ff54c935b19 [ 897.011082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 897.013636] RSP: 002b:00007ff549eab188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 897.014667] RAX: ffffffffffffffda RBX: 00007ff54ca48f60 RCX: 00007ff54c935b19 [ 897.015817] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 897.016994] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 897.018020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 897.019014] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 [ 897.020350] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 910.565011] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:01:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) (fail_nth: 16) 10:01:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:01:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:01:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:01:23 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:01:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:01:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10c0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000040)=0x2) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000180)=""/247) fdatasync(r1) read(r0, &(0x7f0000000080)=""/246, 0xf6) [ 918.768710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:01:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 918.797761] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 918.814312] FAULT_INJECTION: forcing a failure. [ 918.814312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 918.816093] CPU: 1 PID: 6221 Comm: syz-executor.6 Not tainted 5.10.123 #1 [ 918.817106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 918.818728] Call Trace: [ 918.819132] dump_stack+0x107/0x163 [ 918.819651] should_fail.cold+0x5/0xa [ 918.820186] _copy_to_user+0x2e/0x180 [ 918.820750] simple_read_from_buffer+0xcc/0x160 [ 918.821405] proc_fail_nth_read+0x194/0x220 [ 918.821995] ? proc_sessionid_read+0x220/0x220 [ 918.822628] ? security_file_permission+0x24e/0x570 [ 918.823327] ? perf_trace_initcall_start+0x111/0x370 [ 918.824040] ? proc_sessionid_read+0x220/0x220 [ 918.824690] vfs_read+0x228/0x580 [ 918.825178] ksys_read+0x12d/0x250 [ 918.825674] ? __ia32_sys_pwrite64+0x230/0x230 [ 918.826315] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 918.827231] ? syscall_enter_from_user_mode+0x1d/0x50 [ 918.827963] do_syscall_64+0x33/0x40 [ 918.828532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 918.829488] RIP: 0033:0x7ff54c8e869c [ 918.829994] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 918.832648] RSP: 002b:00007ff549eab170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 918.833746] RAX: ffffffffffffffda RBX: 0000000000000028 RCX: 00007ff54c8e869c [ 918.834766] RDX: 000000000000000f RSI: 00007ff549eab1e0 RDI: 0000000000000005 [ 918.835798] RBP: 00007ff549eab1d0 R08: 0000000000000000 R09: 0000000000000000 [ 918.836836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 918.837869] R13: 00007ffc0d95a7cf R14: 00007ff549eab300 R15: 0000000000022000 10:01:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000080)={0x14, 0x8, &(0x7f0000000000)="bc899636601c63a0"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:01:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:01:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 918.985518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 918.996822] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:23 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:01:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:01:23 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 919.043107] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:01:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xa00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:01:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:01:23 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 919.109018] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 919.112885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 919.121086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 919.126084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 936.519518] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:01:50 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000000)) 10:01:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:01:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() 10:01:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:01:50 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:01:50 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:01:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:01:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 945.606245] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 945.608868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 945.612735] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 945.615438] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:01:50 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:01:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:01:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:01:50 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 945.768777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 945.778114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 945.786297] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 945.786345] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:01:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:01:50 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 945.866833] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 945.875752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:01:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 959.754127] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:02:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:02:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) process_vm_readv(r3, &(0x7f0000001680)=[{&(0x7f0000000180)=""/206, 0xce}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/121, 0x79}, {&(0x7f0000000340)=""/6, 0x6}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000380)=""/122, 0x7a}, {&(0x7f0000000400)=""/240, 0xf0}, {&(0x7f0000000500)=""/252, 0xfc}], 0x8, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/153, 0x99}, {&(0x7f0000000600)=""/32, 0x20}], 0x2, 0x0) 10:02:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() 10:02:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:02:12 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:02:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0xac0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 967.775765] __nla_validate_parse: 3 callbacks suppressed [ 967.775777] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 967.781275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 967.783904] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 967.798615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:12 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000180)=""/236, 0xec) [ 967.923269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:02:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 967.936482] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 967.988429] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 968.000334] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:12 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 968.052316] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 982.130237] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:02:34 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r2, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0xff}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x81}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x8001) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0xcc, 0x4, 0x5, 0x1, "1493ec1df9fcf17c21a06418c59c22e97fd6bf0576cb99443625fda3e224bd6d"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:02:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:34 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:02:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:02:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:02:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:02:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() [ 990.401638] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 990.418978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 990.420018] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 990.445682] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:02:34 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xa806, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 990.554364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 990.567881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 990.589746] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 990.616555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xb400, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:02:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, 0x0, 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 990.793257] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 990.799804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1004.690364] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:02:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:02:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:57 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:02:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1012.640342] __nla_validate_parse: 1 callbacks suppressed [ 1012.640352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() 10:02:57 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0xc2002) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x4102f0ab3ea01fd2, 0x0) read(r0, &(0x7f0000000080)=""/237, 0xed) 10:02:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:02:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, 0x0, 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1012.654408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1012.662552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1012.682209] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:02:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:02:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000080)=""/248, 0xf8) [ 1012.789518] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1012.797102] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4c, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:02:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, 0x0, 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x80000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1012.919189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:02:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1012.933296] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1012.935335] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1012.957451] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:02:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:02:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:02:57 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x68, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1027.242677] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:03:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:03:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x7, 0x4288c2) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:03:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() 10:03:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6c, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:03:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xe0ffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:03:22 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:03:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1038.458877] __nla_validate_parse: 4 callbacks suppressed [ 1038.458890] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1038.465136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:03:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1038.545586] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1038.566953] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:03:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/116) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:03:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1038.644224] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1038.676128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:03:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x74, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:03:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1038.852132] cgroup: fork rejected by pids controller in /syz0 [ 1038.932099] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1038.954179] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:03:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:03:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7a, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1039.202106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1059.959255] kmemleak: 42 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:03:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:03:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:03:52 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/248, 0xf8) 10:03:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:03:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1067.855232] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1067.867373] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1067.882297] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getpid() 10:03:52 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:03:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1067.897459] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:03:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1068.002902] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:03:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='o'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1068.021158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1068.028539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x300, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:03:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1068.147360] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1068.151943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1068.188079] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:03:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='o'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:03:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:03:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x500, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:03:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1081.767509] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:04:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:14 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000001c0)=""/65) 10:04:14 executing program 7: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 10:04:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='o'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:04:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x600, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1089.687950] __nla_validate_parse: 7 callbacks suppressed [ 1089.687959] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.695207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1089.703697] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.704340] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:14 executing program 7: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) 10:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x700, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:04:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1089.831212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.836870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.838486] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:14 executing program 7: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) [ 1089.856920] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:04:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xa000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x900, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1089.977272] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.988797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1103.921437] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1112.028871] __nla_validate_parse: 2 callbacks suppressed [ 1112.028881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:04:36 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 10:04:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:04:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9f3, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x59, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x50) dup2(r1, r2) 10:04:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(0xffffffffffffffff) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1112.057220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1112.075801] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:04:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:04:36 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) [ 1112.204068] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1112.207228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1112.215417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1112.218813] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:36 executing program 7: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, 0x0, 0x0) 10:04:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4800, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:04:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1112.331094] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) [ 1112.361485] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1112.387220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1126.305506] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1134.638054] __nla_validate_parse: 1 callbacks suppressed [ 1134.638063] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:59 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000001c0)=""/227) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:04:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:04:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4c00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:04:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:04:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1134.651064] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1134.666395] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1134.669036] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:04:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:04:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:04:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6800, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1134.814275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1134.818422] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1134.832155] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1134.845394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:04:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1134.910042] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1134.919596] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:04:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6c00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:04:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:13 executing program 3: shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffb000/0x3000)=nil) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:05:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:05:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:13 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7400, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:05:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:05:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1149.506105] __nla_validate_parse: 3 callbacks suppressed [ 1149.506124] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1149.510775] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1149.515372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:05:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xa8060000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7a00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1149.652207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1149.682028] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1149.690183] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:05:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 10:05:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xb4000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1149.984864] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1149.987255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1149.994302] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1150.007160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:05:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1163.551025] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:36 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000000)=""/11) 10:05:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:05:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:05:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 10:05:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:05:36 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1171.741407] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1171.750692] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1171.759346] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1171.765199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:05:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf309, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) [ 1171.833534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffe000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1171.836913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:05:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfc00, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1171.918386] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1171.925645] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1171.943208] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1171.949249] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:05:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='oL'], 0xd3) close(r0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) 10:05:36 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:05:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1186.374340] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:05:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:05:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x80000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:05:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1195.284344] __nla_validate_parse: 4 callbacks suppressed [ 1195.284351] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:05:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:05:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:05:59 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d880)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3, "33cb14bafffd4d"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004e880)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004ea80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r17}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r16}, {}, {}, {}, {r18}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r19}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004fa80)={0x100000001, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {0x0, r6}, {0x0, r7}, {r8, r13}, {}, {r14}, {0x0, r19}], 0xff, "1e3ab44951c2e8"}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/248, 0xf8) [ 1195.321572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1195.334043] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:05:59 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:05:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:05:59 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x400300, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1195.528120] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1195.543293] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:06:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x7, 0x400) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 1195.595357] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1195.602458] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:00 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xe0ffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:06:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0x308, 0x2d, 0x800, 0x70bd26, 0x25dfdbfc, {0x13}, [@nested={0x2dc, 0x23, 0x0, 0x1, [@typed={0xd2, 0x61, 0x0, 0x0, @binary="e211cb86e66005d86133f53bfd75355f3f408afc059d6b10b3e408d266fd059ef2c302438db58ac51bbbe470d3345e5f6334723d31d8c5a8bb62d17d64487f3f85387ac54d360506c8dafbb3a24fd66de350a5258fcf5633e6ce00b8c37496d1546370ac0f16ec86cc5aab6e1fb6382bb8eec8eca51f3c475bb38e5ef0d25d710a774ce3fab9eea06a757d406c37054c837c45b2d74fa4522a9eaa0ec8ff093489cba266016b2e6142cba75e440ffe8bd0826ec2d523c9c7ae5af2b53edd542b8c938e889f8e83091303735c5f15"}, @generic="16a9dae2489a5ca5cc6fcdc7b1865d08c02733eaf7c6aea0b1f62614bed0dc23faf4e99b2e61f8d2217fedd9a5de6ade6f82f9fef727aa18356a7238a2b562c07fe04f704ae9dfacf927bbd750c586d4919f3de116f4a6948fe6332de157ee9c8252fff37b55", @generic="efde7edd8f9985f910b3fe40064470a7eec19fa09f2808deb0d0d9876e272bde3551a21259d194ad526a15ace4cbe669e95e4d8b88f1b111012e74f9001a09ed852e557ba37ddb1eca5fd2e612e8db5e6178df6ac6984e62bfaf28ee903ad12f5999d27f8881e575ed9f6d1b7fc48444daa894dcb156c535a92e86986b0edc605f271829e394be8859a7f41a6a9ef20093d4b553133581b09a9442663af14af2aefad6e29c940a1b72ed69e0e7aa66", @generic="0a2a1adcdbb1a544955f8ce4e855fb47e9fdeb7d954b91c2ace3337a3afaf99defc22b848d53cd7c8379c35bc05dbe0ef6d988c12b618cb6baf1b177cb90e39460c9e14d33baf4af3a0a3814e44a112da19c80359f1aab4b18277d2b19891cc8a0d3b3789856b2e82ddb08fe6940bfbca3b06b250f68e389310d7caa24a1149491e29d55d63218621efab5b631e36f8850108ecb7f669bc64a2fde71ed3d4be49189eee0aeb3e3731b34b78f4d23dea0fd17e48ce58567c57702ea43dc2006c77d2324ad10b5cc21863c1b3887f8dbacfdf74c5e66db2230fae043d92e9298", @typed={0x8, 0x58, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x7a, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}]}, @typed={0x16, 0x54, 0x0, 0x0, @str='/dev/input/event#\x00'}]}, 0x308}}, 0x4054) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000002880)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002840)={&(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x22a0}, 0x1, 0x0, 0x0, 0x4040044}, 0x4000010) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000028c0)='./file0\x00', 0x8000, 0x80) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:06:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1195.726692] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1195.736505] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1195.747076] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:06:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:06:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:06:00 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:06:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="0f0000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:06:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1211.228807] kmemleak: 70 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:06:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 10:06:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:06:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1219.430907] __nla_validate_parse: 5 callbacks suppressed [ 1219.430918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1219.456139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000000)={0x17, 0xe8, &(0x7f00000001c0)="6486fa5f63860b48d9839edd0d14ed7dffff3faff44d44dc8d139d27ef1f220f48c4e679c495d744330353f82415c8fa7de629a6a89c8a1785f496c8c99828de6c31065fda43e7afdc0184c91350d5a4e821f5a4dc8963b56cbedc1183da52e03687efacbcfdc8397eb05bbb0e01b06e399370464c00d2ce452cc1f500000000000000000000000000741fcd96c37550d4c76a4e46b57b2464d6d727338408c500af373d28c759a2384970cc89661b98fb266ac7d36f6993b17e91d8d57adf09255e73271cbd04429449131433322171b0d99b0365a13aec0be286a9acd53a3b54a0c221490316304ccf71eeab22900000ea26ac48de1b7a5650177606dcce3ef932ecc263a120c98cb2f5f99a2f2485bf10173596fe58d4adf6013449969735f37ae6e36cb30678587e5365b0a0302f1d94caf11c747c9d21e38795b4f32561e9f417090d7b6a6de780531a187caf9e36b8e9b77456e73b8fe6577190fe47aa5e08d01f977de27e9bf115b1e2d3e0005a5f0530efd189204a6c692b155882db5c351abbebd1f35f7bbd586dcd8818c895a7ef0086"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/46) 10:06:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="230000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:06:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:24 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1219.775750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1219.788569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2d0000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1233.561957] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:06:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1241.867102] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:46 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000001c0)=""/100) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/36) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000240)=""/90) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000080)) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:06:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:06:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="5f0000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:06:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="c00000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:06:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1242.038760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="c00e00002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1242.063617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x5000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:06:46 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="e03f03002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1242.228081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:06:46 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:06:46 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1242.345103] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1242.356342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1256.128227] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:07:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000280)=""/62) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x1, 0xa, 0x7, 0x65, "60075a55e979b4610b241eebe6c1510500d64f4671c57600b30a8804f2d416a2"}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x2, 0xa1, &(0x7f00000001c0)="6673406d803ecf4e1c1f694b27ab02d5523fd7f2d14cd335da91cb9ebb88bea116e63cf82ede68975939870b40334ad0e41c20e019f1ca4c726c4535ad0f442d6bb55abddce94dbac6dadaf3ebc6dc1c6696bdabc40a66b4b08d816787b83e26fa0330138bb2abffce08392e8fd9580a62a33d10840a23e80ce1c422270d05f90740c616b355ecf95a8469e6a3d5fbf0b6295b5f483a61c91c1f35858c1d22317d"}) 10:07:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="680400202d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1264.280572] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:07:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1264.295565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="00f0ff7f2d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1264.426187] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1264.449334] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="effdffff2d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:07:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1264.593384] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1264.612750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:07:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000000a00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:07:09 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x48000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1264.759962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1264.767617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1264.776323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=7882 comm=syz-executor.5 [ 1278.621576] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:07:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x4c000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:07:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000000f00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:07:31 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000080)) r1 = syz_open_dev$evdev(&(0x7f0000000240), 0x60, 0x800) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) recvfrom(r2, &(0x7f0000000280)=""/117, 0x75, 0x10120, 0x0, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000200)) read(r1, &(0x7f00000000c0)=""/240, 0xf0) 10:07:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1286.840522] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1286.848901] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=7903 comm=syz-executor.5 10:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001000010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1286.887708] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1286.936315] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1286.941141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:07:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000080)=""/233, 0xe9) 10:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001100010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:07:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x68000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1287.063595] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1287.070044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1287.078768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1287.083769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x6c000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001200010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1287.147639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1287.156720] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1301.081385] kmemleak: 30 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:07:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:07:53 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x74000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000000080), 0x0, r0}, 0x68) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x141040, 0x0) read(r2, &(0x7f00000001c0)=""/244, 0xf4) r3 = inotify_init() dup2(r1, r3) 10:07:53 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:07:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001300010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:07:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:07:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() setpriority(0x1, r1, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1309.348608] __nla_validate_parse: 4 callbacks suppressed [ 1309.348637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1309.361688] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:53 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x7a000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:53 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfffffffb, 0x30000}}, './file0\x00'}) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000001c0)=""/195) [ 1309.413412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 10:07:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1309.458878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001400010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1309.488143] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:54 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x81000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001500010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1309.638327] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1309.664894] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:07:54 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x9effffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:07:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001600010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1309.792752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1309.806347] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1323.856899] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1332.091571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:08:16 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000004}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xec, r1, 0x1, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0xc8, 0xc5, "8a22a13c5b7f438424a8d14e95a08cfd7f383407152232f7978b4dfe66604053d7f95dd18c4e2671d34c01f91ae2d37cfd89eaa7d7d7d0073c21b95141106ab2e1a90146d34ececf6b5a4c70e88abf564a22a9562a60b6183b3752d9ae2a9315b82d6a97509f7f4aa88d03a85a4a4efa9cc7507a2a3f692bb3012dfd5c79366a406898f9634f7cad94c84404aa8bbf804ddbbc05b6dc83cc6f3003c17cea3db7901c4928b68d6f105ee3bd04166dde40153454c58cb3ebdb4f74b4d6c94c9899cc8ab288"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x6db}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x997}]}, 0xec}, 0x1, 0x0, 0x0, 0x40014}, 0x20040890) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x230501) preadv(r2, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/44, 0x2c}, {&(0x7f0000000100)=""/52, 0x34}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000380)=""/254, 0xfe}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/104, 0x68}], 0x6, 0x3, 0x2) 10:08:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001800010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:08:16 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:08:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf0ffffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:08:16 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1332.117377] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:08:16 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xf3090000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:08:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001900010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1332.229338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1332.234589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:08:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000080)=""/255, 0xff) 10:08:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001a00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:08:31 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:08:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:08:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfc000000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1347.005575] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1347.010928] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:08:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1347.047092] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1347.052468] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:08:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffe000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:08:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:08:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:08:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001e00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1347.166709] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1347.173184] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1347.215925] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 10:08:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfffff000, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1347.269044] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1347.279338] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1347.293884] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:08:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002000010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:08:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffff7f, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) 10:08:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1361.322256] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:09:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:00 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x1, 0x67, &(0x7f00000001c0)="af792536a828a331ad535d561a3061140c7bf6436e7ef083a145219e933b48f00ac095c55a3b18bfd6a6ece2f82431975b4ab9a5d2f82fa91ce59134bded9fc6082d5eee43ebd80bc2d68ec51179b99db2dc26e87f7ca445982bf6a247f38bf3bce1e88e933c91"}) 10:09:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002100010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:09:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) getpid() fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:00 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:00 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1375.672362] __nla_validate_parse: 4 callbacks suppressed [ 1375.672372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1375.683222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:09:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:00 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffffff, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002d0001"], 0x28}}, 0x0) [ 1375.792870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1375.803048] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1389.938831] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:09:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="0f0000002d0001"], 0x28}}, 0x0) 10:09:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/54) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000080)=""/191) 10:09:22 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002200010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:09:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002400010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1397.818532] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:09:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x10040) read(r0, &(0x7f00000000c0)=""/248, 0xf8) dup3(r0, r0, 0x80000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x246482, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000002c0)=""/71) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/86) [ 1397.881906] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:09:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000002d0001"], 0x28}}, 0x0) 10:09:22 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000001c0)=""/153) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:09:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002500010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:09:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1398.107581] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:09:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="230000002d0001"], 0x28}}, 0x0) [ 1398.122977] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:09:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002600010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1398.245469] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:09:22 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2d0000002d0001"], 0x28}}, 0x0) [ 1398.265627] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1398.841051] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1398.847520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:09:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002800010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:09:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="5f0000002d0001"], 0x28}}, 0x0) 10:09:23 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:23 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:23 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="c00000002d0001"], 0x28}}, 0x0) 10:09:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002900010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1398.991153] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1399.002918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1413.106013] kmemleak: 73 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:09:45 executing program 7: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:45 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = getpgrp(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB="2e2f662d16cc3f2555000000000000000000"]) clone3(&(0x7f00000003c0)={0x100000080, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000001c0), {0x41}, &(0x7f0000000200)=""/33, 0x21, &(0x7f0000000240)=""/226, &(0x7f0000000340)=[r1, 0x0], 0x2, {r2}}, 0x58) 10:09:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:45 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002a00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:09:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="c00e00002d0001"], 0x28}}, 0x0) 10:09:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:09:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:09:45 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="e03f03002d0001"], 0x28}}, 0x0) [ 1435.703148] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1443.750100] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1443.755537] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 10:10:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x400000000000001, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:10:08 executing program 7: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r0 = getpid() kcmp(0xffffffffffffffff, r0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002c00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="680400202d0001"], 0x28}}, 0x0) 10:10:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x410001) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/76) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:10:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280200002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:08 executing program 7: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="00f0ff7f2d0001"], 0x28}}, 0x0) 10:10:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x80000001, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:10:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:08 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x6, 0x7, 0x50, 0x9, 0x0, 0x2, 0x2851506e13e88151, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xf1, 0x4, @perf_config_ext, 0x2042, 0x3ff, 0x40, 0x3, 0x81, 0x20, 0x5, 0x0, 0x1f, 0x0, 0x91}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) dup2(r0, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}, 0x7ff}], 0x1, 0x40001143, 0x0) dup2(0xffffffffffffffff, r1) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000200)="62079e", 0x3, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x5, 0x2, 0x0, 0x2, 0x0, 0x2, 0x200, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x10000, 0x1, 0x8000, 0x2, 0x5, 0x2, 0x2f8, 0x0, 0x80000000, 0x0, 0x7}, 0x0, 0x0, r2, 0x3) 10:10:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280300002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:08 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="effdffff2d0001"], 0x28}}, 0x0) 10:10:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r0 = getpid() kcmp(0xffffffffffffffff, r0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:08 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000000a0001"], 0x28}}, 0x0) 10:10:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280400002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:08 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r0 = getpid() kcmp(0xffffffffffffffff, r0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1444.196353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=8669 comm=syz-executor.6 [ 1444.203200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=8672 comm=syz-executor.6 [ 1457.994209] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:10:30 executing program 1: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:30 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:30 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002c00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000000f0001"], 0x28}}, 0x0) 10:10:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:30 executing program 3: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x6, @remote}, 0x10, {0x2, 0x4e23, @broadcast}, 'virt_wifi0\x00'}) r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x105c02) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x4, 0x1d, &(0x7f0000000040)="c203e8149a167458db3d5b06a331bdfdc3f0237929e26dbbf06ba657e5"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) [ 1466.100787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=8688 comm=syz-executor.6 [ 1466.107454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 10:10:30 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r0 = getpid() kcmp(0xffffffffffffffff, r0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1466.142019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=8697 comm=syz-executor.6 10:10:30 executing program 1: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1479.748024] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:10:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000100001"], 0x28}}, 0x0) 10:10:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:52 executing program 1: fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1487.612954] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:10:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:52 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280600002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:52 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280700002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000110001"], 0x28}}, 0x0) [ 1487.766204] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:10:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:52 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280800002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:52 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:10:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000120001"], 0x28}}, 0x0) [ 1487.894528] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:10:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280900002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:10:52 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:10:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1487.910744] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1501.823255] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1510.314792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:11:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280a00002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000130001"], 0x28}}, 0x0) 10:11:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1510.337968] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. 10:11:14 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f0000000340)=""/248, 0xf8) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000002c0)=""/109) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000100)=0x1) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0x2) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000140)=0x6) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='net/xfrm_stat\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r1, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x98, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x98}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000080)=""/94) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x50, 0xffffffffffffffff, 0x443a1000) 10:11:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280f00002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000140001"], 0x28}}, 0x0) 10:11:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:14 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000150001"], 0x28}}, 0x0) 10:11:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="284800002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:15 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000160001"], 0x28}}, 0x0) 10:11:29 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="284c00002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:29 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000180001"], 0x28}}, 0x0) 10:11:29 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x8000000, 0x535583) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x4b}}], 0x1, 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) poll(&(0x7f0000000000)=[{r1, 0x101}, {r2, 0x30}], 0x2, 0xd94b) 10:11:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x100, 0x17c) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000190001"], 0x28}}, 0x0) 10:11:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="286800002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001a0001"], 0x28}}, 0x0) 10:11:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="286c00002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001c0001"], 0x28}}, 0x0) [ 1525.910153] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1525.932111] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 10:11:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001d0001"], 0x28}}, 0x0) 10:11:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="287400002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1540.303343] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:11:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:11:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000001e0001"], 0x28}}, 0x0) 10:11:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="287a00002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:52 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:11:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) [ 1547.702496] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.6'. 10:11:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x220040) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:11:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28b400002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000200001"], 0x28}}, 0x0) 10:11:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28f000002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:52 executing program 3: r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x810, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r0, &(0x7f0000000080)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, {0x2}}, 0x1) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x1001, 0x10000) read(r1, &(0x7f00000002c0)=""/248, 0xf8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r2, 0x4, 0xfff, 0x100000001, 0x2}) read$hiddev(r2, &(0x7f00000001c0)=""/215, 0xd7) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000000c0)=""/35) syz_memcpy_off$IO_URING_METADATA_FLAGS(0x0, 0x114, &(0x7f0000000100), 0x0, 0x4) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)=ANY=[@ANYBLOB="010000bde26cb30018000000", @ANYRES32=r3, @ANYBLOB="030000000500000000"]) 10:11:52 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/clocksource', 0xa400, 0x140) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:11:52 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000210001"], 0x28}}, 0x0) 10:11:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280003002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:11:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280005002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1548.988509] hpet: Lost 1 RTC interrupts [ 1566.429722] kmemleak: 74 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:12:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:12:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x2, &(0x7f0000000a80)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0xfffffffffffffffe}]) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) io_pgetevents(r1, 0x0, 0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000080)={r2, r3+10000000}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x401]}, 0x8}) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r4, &(0x7f00000000c0)=""/248, 0xf8) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340), r0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="200026bd7000fddbdf250900000008000400050000002c00028005000d0000000000080007000600000008000900feffffff06000e004e20000008000900ffff0000"], 0x48}, 0x1, 0x0, 0x0, 0x40001}, 0x20000010) 10:12:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:12:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:12:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:12:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280006002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000220001"], 0x28}}, 0x0) 10:12:18 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:12:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28a806002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000240001"], 0x28}}, 0x0) [ 1574.144031] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1574.174136] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:12:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280007002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000250001"], 0x28}}, 0x0) [ 1574.295402] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1574.302512] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:12:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280009002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:18 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000260001"], 0x28}}, 0x0) [ 1574.442285] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:12:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1574.462770] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:12:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000a002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:12:19 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000280001"], 0x28}}, 0x0) [ 1574.926184] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1574.930253] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1590.197255] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:12:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:12:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000f002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:12:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:12:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x4, 0xff, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c005f1cb0378d88969af5ebc32800c8ce000000040000007ed256e17f17593d5b7587a99d274f"], 0x1c}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000580)=[{&(0x7f0000000080)=""/104, 0x68}], 0x1, 0x7, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)={0x4, 0x7f, 0x8, 0x0, 0xfffffbff, 0xc3}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, 0x0) getsockname$netlink(r0, &(0x7f0000000300), &(0x7f0000000340)=0xc) dup(r2) dup3(0xffffffffffffffff, r0, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r3, &(0x7f0000000200)="62079e", 0x3, 0x0) openat(r3, &(0x7f0000000380)='./file0\x00', 0x484080, 0x1a4) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x400400) read(r4, &(0x7f00000000c0)=""/248, 0xf8) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000000)={0x14, 0xe4, &(0x7f00000001c0)="2ee2f620f4907ef4c3de1f530fa432eeca7f07bf3115072ea7b7eac6ebfb61e2b3b93ca2e39d9fad160c76f6f97104c3514d0c81be3c52ddca4e58bd3e4937943232bddbc09e51af6893fc532a868af06947d8ae2370fa423316a6c01a2f52ce8a226a12b4970d3a129111f7ddc1c0d66182c2312fa8f2fa4fda91dd8d465770b6996d5f6c3ad01ea0dcb3f33a73a2bd427deae280ccae8dab71507d7aedcaabc231574ff606d2d2fc0d1ee05e71057540b2e0b561d6685eeec38a7c7961c0be94ca206bdd0128f5ea34b5585c5735c8f20b32574bfc84fcb3c49637f8270fedb89159c1"}) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) 10:12:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:12:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000000290001"], 0x28}}, 0x0) 10:12:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1598.824432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1598.974951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1599.017055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:12:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280048002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002a0001"], 0x28}}, 0x0) 10:12:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28004c002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x101) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:12:43 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000002c0001"], 0x28}}, 0x0) 10:12:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280068002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:12:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000002c0)=""/141) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x680402, 0x0, 0x14}, 0x18) ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000680)=""/4096) pwrite64(r2, &(0x7f00000001c0)="80f377d810655acb81e4ea24552d79dd5dcc425530b2c8e0233946a83fc0a16c70836de68d15ecd1d55af7683b602c7e502fe48803a7aa997278c3fc0da9c9aa02974ccaaa9e887e5b4c645f0c145257a4588593168e1f1624dfd4b10fa30a09b49e1feee89f0ad313bd3922eaaed758b2ee9dd49316cde7097aeca75438ad9153a0776224a296253726c510ffe4b2104cd7650258d4783979a27cf7d43f9df1a53271bc6c119bb8c936d323705301b49ed6e2bda349a602182cfe030b91bf00b152685b8082f923fa02a529015e85f2c2b4be550ed792a5f7ffe464d97fec54637af584a8", 0xe5, 0x3) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7, 0x100000001, 0xcb, 0x1, 0x0, 0xb}) [ 1599.138795] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. [ 1599.144918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 10:12:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280200002d0001"], 0x28}}, 0x0) [ 1603.498240] hpet: Lost 1 RTC interrupts [ 1603.998320] hpet: Lost 1 RTC interrupts [ 1605.794219] hpet: Lost 1 RTC interrupts [ 1614.407496] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1619.934691] hpet: Lost 1 RTC interrupts 10:13:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:06 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280300002d0001"], 0x28}}, 0x0) 10:13:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x17c) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:06 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000000)={0x17, 0xe5, &(0x7f00000001c0)="eb7ab3fa72bd37aa0bd0a9193439465a464e822a20b22c8b6593d35430c8cbc7545d68c3e8e440ea73ab6374f1984f4ffecf830495a4f94ea83f0251edbc0ac129d4e770672e9510f3e453ebb91c0c2392d4bd4608ebaf744f591198f0fc3b7d9eb2fd41efb646df3cb5246cc1cad071d57c493fbb848b844d02756bdc558faf4ee10603baffb9a52a78bebd61ced400dc6d831bf63e9029092460ae8fe0a14ef086c695ac2ecfb79dce3425a0df1a829f840a91a2f6f4aa74031646bb92c629e555f69c2d345a035d9f5cae5bb513b8b7d602b0b79e16d2c448c34f4c985267a0a99e23a1"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:13:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28006c002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280074002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:06 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280400002d0001"], 0x28}}, 0x0) 10:13:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28007a002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280500002d0001"], 0x28}}, 0x0) 10:13:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2806a8002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280600002d0001"], 0x28}}, 0x0) 10:13:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800b4002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280700002d0001"], 0x28}}, 0x0) [ 1638.405981] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1642.967149] hpet: Lost 2 RTC interrupts [ 1644.700365] hpet: Lost 1 RTC interrupts [ 1644.767823] hpet: Lost 2 RTC interrupts [ 1645.122749] hpet: Lost 1 RTC interrupts [ 1645.154735] hpet: Lost 1 RTC interrupts 10:13:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:31 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x5, 0x4, 0x0, 0x7fffffff, 0x3, 0x0, 0x3, 0x155, 0x40, 0x65, 0x2, 0x0, 0x38, 0x1, 0xfffb, 0x8, 0x8f}, [{0x6474e551, 0x6, 0x0, 0x6, 0xc6ad98d, 0x0, 0x3, 0x3}, {0x4, 0x2, 0x8000, 0xffff, 0x2400000, 0x522, 0xa, 0x17b9}], "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", ['\x00', '\x00', '\x00', '\x00']}, 0x14b0) 10:13:31 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280800002d0001"], 0x28}}, 0x0) 10:13:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800f0002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000005f00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280900002d0001"], 0x28}}, 0x0) [ 1647.644207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pid=9820 comm=syz-executor.5 [ 1647.656524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=95 sclass=netlink_route_socket pid=9831 comm=syz-executor.5 10:13:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280000007300010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280f00002d0001"], 0x28}}, 0x0) [ 1647.768213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=9898 comm=syz-executor.5 [ 1647.777497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=9900 comm=syz-executor.5 10:13:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280002002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:32 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="284800002d0001"], 0x28}}, 0x0) 10:13:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:32 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280003002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1652.090827] hpet: Lost 1 RTC interrupts [ 1657.714813] hpet: Lost 1 RTC interrupts [ 1662.814333] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:13:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x0, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="284c00002d0001"], 0x28}}, 0x0) 10:13:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280004002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:13:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:56 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0xffffffffffff8000, 0x331002) read(r0, &(0x7f00000000c0)=""/248, 0xf8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000)={0x8, 0x5, 0xffff3069, 0x3, 0x40}, 0x14) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x9, 0xfa, 0x5, 0x7a, 0x0, 0x2, 0x1000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffffa, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x40, 0x1f, 0x7, 0x4, 0x5, 0x9, 0x2, 0x0, 0x4352}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) socket$netlink(0x10, 0x3, 0x2) r1 = socket(0x2, 0x5, 0x3) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r3 = syz_io_uring_complete(0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r2, 0x9, 0x1, 0x80}) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f00000001c0)={0x3, 0x1}, 0x4) dup2(r1, r2) 10:13:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="286800002d0001"], 0x28}}, 0x0) 10:13:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280005002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="286c00002d0001"], 0x28}}, 0x0) 10:13:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:13:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280006002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:13:56 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="287400002d0001"], 0x28}}, 0x0) 10:13:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280007002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1688.650472] kmemleak: 88 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:14:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:14:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280008002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:14:21 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:21 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="287a00002d0001"], 0x28}}, 0x0) 10:14:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = getpid() kcmp(0xffffffffffffffff, r1, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:14:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:14:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x4) read(r0, &(0x7f00000000c0)=""/248, 0xf8) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x4001, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000280), &(0x7f00000002c0), 0x2, 0x3) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000240)={&(0x7f00000001c0)=""/82, 0x52, 0x6, 0xa8a}) 10:14:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280009002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:14:21 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28f000002d0001"], 0x28}}, 0x0) 10:14:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000a002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) [ 1698.499380] hpet: Lost 2 RTC interrupts [ 1701.411560] hpet: Lost 1 RTC interrupts [ 1711.529638] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:14:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x3, 0x100) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r1, 0xc018937a, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x1}}, './file0\x00'}) r4 = openat(r3, &(0x7f0000000280)='./file0/file0\x00', 0xc1000, 0x241) renameat2(r2, &(0x7f00000002c0)='./file0/file0\x00', r4, &(0x7f0000000300)='./file0\x00', 0x0) ioctl$EVIOCGID(r2, 0x80084502, &(0x7f00000001c0)=""/117) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40001, 0x146) read(r0, &(0x7f00000000c0)=""/248, 0xf8) 10:14:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:14:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x17c) getpid() kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:14:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28fc00002d0001"], 0x28}}, 0x0) 10:14:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28000f002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:14:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280048002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:14:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:44 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, "5b0a080e411a948823f5a5e400"}) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f00000002c0)={0x15, 0x54, &(0x7f0000000240)="82c0eef7e2489379d135a8e048007f326f70cbe69e5052a71dad706b6bd420f376d2e258188202f44c28dc9703e872e534848cc1167de66a5b0f8e1219382347cca6699c52290078e20758bf0a689482f8dc812b"}) read(r0, &(0x7f00000000c0)=""/248, 0xf8) syz_io_uring_setup(0x2e51, &(0x7f00000001c0)={0x0, 0x519d, 0x4, 0x3, 0x323}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000080)) 10:14:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280003002d0001"], 0x28}}, 0x0) 10:14:44 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28004c002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:14:44 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:14:44 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280005002d0001"], 0x28}}, 0x0) 10:14:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1734.935674] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:15:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280068002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:15:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0xb, 0x440) read(r0, &(0x7f00000001c0)=""/248, 0xf8) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x5, 0xef, &(0x7f0000000040)="251d3f54d6ed773ef340a2115c4e214ffb2610d195e29bc95f32004439620783e9940529276f501fad2a7746b3b4159f23d73baa59d56d323fe7bc3f50278a93418a0963515420304cb18b11df819fc6e8798de772afd716512ecad2a924788a777e65fc6eb3b5906e942305bb00c32c758abcd55c7486c283b208cac8e246467dc480707d2e3ed843dad1fd439f788463d702edb30076fa701f9cf59cb70dceca2d8a16342d8a33a1614137f1c7125bafad8f535dbf9e2865575af68579f0c56e6a985b56a77a0af8d4ed904905755211f2824e159dd53b61d68890ad0aadab52b9d6aa0783d00c9f241474788ec7"}) 10:15:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x17c) getpid() kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:15:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:15:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280006002d0001"], 0x28}}, 0x0) 10:15:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280007002d0001"], 0x28}}, 0x0) 10:15:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:07 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1755.264362] hpet: Lost 1 RTC interrupts [ 1762.175489] kmemleak: 117 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 10:15:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:15:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280009002d0001"], 0x28}}, 0x0) 10:15:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, 0x0, &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x17c) getpid() kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:35 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/258, 0x102) 10:15:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x17c) getpid() kcmp(0xffffffffffffffff, 0x0, 0x5, r0, 0xffffffffffffffff) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f0000000100)='./file0\x00', 0x22) 10:15:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28006c002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:15:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:15:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="280074002d00010d00ecffffff002d9eaa52cee4fffffffff6fa54430b310fa4a04f3a"], 0x28}}, 0x0) 10:15:35 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="28f309002d0001"], 0x28}}, 0x0) 10:15:35 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:15:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 10:15:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1792.362793] watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [syz-executor.7:10591] [ 1792.363911] Modules linked in: [ 1792.364341] irq event stamp: 3853311 [ 1792.364940] hardirqs last enabled at (3853310): [] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1792.370116] hardirqs last disabled at (3853311): [] sysvec_apic_timer_interrupt+0xb/0xa0 [ 1792.371513] softirqs last enabled at (3812094): [] asm_call_irq_on_stack+0x12/0x20 [ 1792.372918] softirqs last disabled at (3812097): [] asm_call_irq_on_stack+0x12/0x20 [ 1792.375272] CPU: 0 PID: 10591 Comm: syz-executor.7 Not tainted 5.10.123 #1 [ 1792.377781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1792.381290] RIP: 0010:unwind_next_frame+0x186/0x1a90 [ 1792.382054] Code: 04 02 48 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 55 09 00 00 4c 89 e1 41 0f b6 45 35 48 ba 00 00 00 00 00 fc ff df 48 c1 e9 03 <80> 3c 11 00 0f 85 84 12 00 00 4d 8b 7d 48 3c 01 48 c7 c1 20 7a cb [ 1792.389731] RSP: 0018:ffff88806ce09668 EFLAGS: 00000212 [ 1792.390665] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 1ffff1100d9c12f1 [ 1792.391795] RDX: dffffc0000000000 RSI: ffffffff812749ae RDI: ffff8880471c7620 [ 1792.392958] RBP: ffff88806ce09775 R08: ffffffff85b2d9ff R09: ffff8880471c7598 [ 1792.394070] R10: 0000000000030041 R11: 1ffff1100d9c12d5 R12: ffff88806ce09788 [ 1792.395163] R13: ffff88806ce09740 R14: 1ffff1100d9c12d5 R15: 00000000000000e0 [ 1792.396263] FS: 00007fe056286700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 1792.397642] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1792.398542] CR2: 0000001b2d225000 CR3: 0000000044378000 CR4: 0000000000350ef0 [ 1792.399638] Call Trace: [ 1792.400018] [ 1792.400464] ? do_raw_spin_lock+0x5e/0x260 [ 1792.401108] ? deref_stack_reg+0x150/0x150 [ 1792.401851] ? __unwind_start+0x51b/0x7d0 [ 1792.402506] ? create_prof_cpu_mask+0x20/0x20 [ 1792.403209] arch_stack_walk+0x83/0xf0 [ 1792.403858] ? do_raw_spin_lock+0x5e/0x260 [ 1792.404596] stack_trace_save+0x8c/0xc0 [ 1792.405244] ? stack_trace_consume_entry+0x160/0x160 [ 1792.406487] ? find_held_lock+0x2c/0x110 [ 1792.407084] kasan_save_stack+0x1b/0x40 [ 1792.407729] ? kasan_save_stack+0x1b/0x40 [ 1792.408441] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1792.409199] ? kmem_cache_alloc_node+0x14b/0x370 [ 1792.409967] ? __alloc_skb+0x6d/0x620 [ 1792.410596] ? __netdev_alloc_skb+0x6e/0x360 [ 1792.411247] ? __ieee80211_beacon_get+0x3af/0x13a0 [ 1792.412058] ? ieee80211_beacon_get_tim+0x88/0x900 [ 1792.412937] ? mac80211_hwsim_beacon_tx+0x111/0x8f0 [ 1792.413767] ? __iterate_interfaces+0x1f0/0x530 [ 1792.414534] ? ieee80211_iterate_active_interfaces_atomic+0x72/0x180 [ 1792.415522] ? mac80211_hwsim_beacon+0xcd/0x1c0 [ 1792.416214] ? __hrtimer_run_queues+0x5e8/0xb50 [ 1792.424546] ? hrtimer_run_softirq+0x148/0x310 [ 1792.425251] ? __do_softirq+0x1b8/0x867 [ 1792.425833] ? asm_call_irq_on_stack+0x12/0x20 [ 1792.426502] ? do_softirq_own_stack+0x80/0xa0 [ 1792.427157] ? irq_exit_rcu+0x110/0x1a0 [ 1792.427741] ? sysvec_apic_timer_interrupt+0x43/0xa0 [ 1792.428476] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1792.429304] ? do_raw_spin_lock+0x5e/0x260 [ 1792.429922] ? lock_chain_count+0x20/0x20 [ 1792.430521] ? ktime_get+0x158/0x1f0 [ 1792.431113] ? lapic_timer_set_periodic+0x60/0x60 [ 1792.431814] ? clockevents_program_event+0x131/0x350 [ 1792.433368] ? tick_program_event+0xa8/0x130 [ 1792.434013] ? hrtimer_interrupt+0x771/0x9b0 [ 1792.434659] ? mark_held_locks+0x9e/0xe0 [ 1792.435257] ? kasan_unpoison_shadow+0x33/0x40 [ 1792.435918] __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1792.436635] kmem_cache_alloc_node+0x14b/0x370 [ 1792.437396] __alloc_skb+0x6d/0x620 [ 1792.437940] __netdev_alloc_skb+0x6e/0x360 [ 1792.438555] __ieee80211_beacon_get+0x3af/0x13a0 [ 1792.439255] ? ieee80211_set_beacon_cntdwn+0x650/0x650 [ 1792.440029] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1792.440919] ? SOFTIRQ_verbose+0x10/0x10 [ 1792.441507] ieee80211_beacon_get_tim+0x88/0x900 [ 1792.442206] ? hrtimer_interrupt+0x771/0x9b0 [ 1792.442848] ? ieee80211_beacon_get_template+0x30/0x30 [ 1792.443606] ? lock_acquire+0x197/0x490 [ 1792.444192] ? ieee80211_get_vif_queues+0x1b0/0x1b0 [ 1792.445030] mac80211_hwsim_beacon_tx+0x111/0x8f0 [ 1792.445726] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1792.446496] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1792.447287] __iterate_interfaces+0x1f0/0x530 [ 1792.447932] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 1792.448650] ? mac80211_hwsim_tx_frame+0x1e0/0x1e0 [ 1792.449467] ieee80211_iterate_active_interfaces_atomic+0x72/0x180 [ 1792.450375] mac80211_hwsim_beacon+0xcd/0x1c0 [ 1792.451036] ? mac80211_hwsim_tx_frame_no_nl.isra.0+0x13c0/0x13c0 [ 1792.451927] __hrtimer_run_queues+0x5e8/0xb50 [ 1792.452591] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1792.453470] ? ktime_get_update_offsets_now+0x25c/0x360 [ 1792.454246] hrtimer_run_softirq+0x148/0x310 [ 1792.454899] __do_softirq+0x1b8/0x867 [ 1792.455461] asm_call_irq_on_stack+0x12/0x20 [ 1792.456103] [ 1792.456434] do_softirq_own_stack+0x80/0xa0 [ 1792.457175] irq_exit_rcu+0x110/0x1a0 [ 1792.457733] sysvec_apic_timer_interrupt+0x43/0xa0 [ 1792.458442] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1792.459157] RIP: 0010:do_raw_spin_lock+0x5e/0x260 [ 1792.459776] Code: 48 c1 ed 03 48 c7 44 24 18 50 49 27 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 48 89 fa 48 c1 ea 03 0f b6 14 02 <48> 89 f8 65 48 8b 0c 25 28 00 00 00 48 89 4c 24 60 31 c9 83 e0 07 [ 1792.464050] RSP: 0018:ffff8880471c7648 EFLAGS: 00000213 [ 1792.464937] RAX: dffffc0000000000 RBX: ffff88800ec86478 RCX: 0000000000007cf4 [ 1792.465982] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88800ec8647c [ 1792.467020] RBP: 1ffff11008e38eca R08: 0000000000000000 R09: ffffffff865526e7 [ 1792.468064] R10: 0000000000000246 R11: 0000000000000001 R12: ffff88800ec864d0 [ 1792.469197] R13: ffff88801abbfb58 R14: ffff88800ec86000 R15: 0000000000000001 [ 1792.470265] ? rwlock_bug.part.0+0x90/0x90 [ 1792.470895] ? ext4_try_merge_freed_extent.part.0+0x20b/0x2a0 [ 1792.471743] ext4_mb_free_metadata.isra.0+0x50d/0xb90 [ 1792.472506] ? ext4_mb_free_metadata.isra.0+0x2/0xb90 [ 1792.473363] ext4_free_blocks+0xb97/0x20e0 [ 1792.474009] ? ext4_mb_new_blocks+0x4840/0x4840 [ 1792.474710] ? __ext4_journal_ensure_credits+0x263/0x2e0 [ 1792.475511] ext4_ext_remove_space+0x1f7e/0x4000 [ 1792.476229] ? ext4_ext_index_trans_blocks+0x160/0x160 [ 1792.477097] ? ext4_es_remove_extent+0x103/0x3f0 [ 1792.477789] ? ext4_es_lookup_extent+0xbe0/0xbe0 [ 1792.478478] ? down_write+0xe0/0x150 [ 1792.479027] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1792.479764] ext4_ext_truncate+0x1e6/0x240 [ 1792.480381] ext4_truncate+0xd5a/0x12b0 [ 1792.481071] ? ext4_punch_hole+0x1210/0x1210 [ 1792.481708] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 1792.482431] ? ext4_file_write_iter+0x101e/0x1890 [ 1792.483130] ? ext4_file_write_iter+0x12e6/0x1890 [ 1792.483836] ext4_file_write_iter+0x1355/0x1890 [ 1792.484523] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1792.485313] new_sync_write+0x42c/0x660 [ 1792.485906] ? new_sync_read+0x6f0/0x6f0 [ 1792.486501] ? ksys_write+0x12d/0x250 [ 1792.487066] ? lock_release+0x6b0/0x6b0 [ 1792.487643] ? selinux_file_permission+0x36/0x510 [ 1792.488348] ? __fget_files+0x296/0x480 [ 1792.489026] vfs_write+0x743/0xa20 [ 1792.489548] ksys_write+0x12d/0x250 [ 1792.490078] ? __ia32_sys_read+0xb0/0xb0 [ 1792.490604] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1792.491307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1792.492007] do_syscall_64+0x33/0x40 [ 1792.492489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1792.493302] RIP: 0033:0x7fe058d10b19 [ 1792.493799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1792.496306] RSP: 002b:00007fe056286188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1792.497330] RAX: ffffffffffffffda RBX: 00007fe058e23f60 RCX: 00007fe058d10b19 [ 1792.498281] RDX: 000000000000fdef RSI: 00000000200001c0 RDI: 0000000000000003 [ 1792.499254] RBP: 00007fe058d6af6d R08: 0000000000000000 R09: 0000000000000000 [ 1792.500239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1792.501973] R13: 00007ffe79db119f R14: 00007fe056286300 R15: 0000000000022000 [ 1792.504001] Sending NMI from CPU 0 to CPUs 1: [ 1792.505694] NMI backtrace for cpu 1 [ 1792.505701] CPU: 1 PID: 287 Comm: syz-executor.4 Not tainted 5.10.123 #1 [ 1792.505707] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1792.505711] RIP: 0010:queued_spin_lock_slowpath+0x11e/0x8c0 [ 1792.505721] Code: 8b 84 24 80 00 00 00 65 48 2b 04 25 28 00 00 00 0f 85 05 07 00 00 48 81 c4 88 00 00 00 5b 5d 41 5c 41 5d 41 5e 41 5f c3 f3 90 77 ff ff ff 44 8b 74 24 48 41 81 fe 00 01 00 00 0f 84 e1 00 00 [ 1792.505725] RSP: 0018:ffff888041807a80 EFLAGS: 00000202 [ 1792.505733] RAX: 0000000000000000 RBX: ffff888008bac040 RCX: ffffffff8126fcf7 [ 1792.505738] RDX: ffffed1001175809 RSI: 0000000000000004 RDI: ffff888008bac040 [ 1792.505742] RBP: 0000000000000001 R08: 0000000000000000 R09: ffff888008bac043 [ 1792.505746] R10: ffffed1001175808 R11: 0000000000000001 R12: 0000000000000003 [ 1792.505752] R13: ffffed1001175808 R14: 0000000000000001 R15: 1ffff11008300f51 [ 1792.505757] FS: 0000555555aec400(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1792.505760] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1792.505765] CR2: 00007ffc4cdd2cb8 CR3: 00000000417fc000 CR4: 0000000000350ee0 [ 1792.505771] Call Trace: [ 1792.505775] ? osq_unlock+0x1a0/0x1a0 [ 1792.505778] ? lock_acquire+0x197/0x490 [ 1792.505781] ? ext4_free_inode+0x7a6/0x1340 [ 1792.505785] ? lock_release+0x6b0/0x6b0 [ 1792.505789] do_raw_spin_lock+0x1d8/0x260 [ 1792.505792] ? rwlock_bug.part.0+0x90/0x90 [ 1792.505796] ext4_free_inode+0x7a6/0x1340 [ 1792.505800] ? ext4_mark_bitmap_end+0x40/0x40 [ 1792.505804] ? __ext4_journal_start_sb+0x210/0x420 [ 1792.505807] ? __ext4_journal_start_sb+0x1db/0x420 [ 1792.505810] ext4_evict_inode+0xe28/0x1a40 [ 1792.505814] ? ext4_da_write_begin+0xde0/0xde0 [ 1792.505817] ? rwlock_bug.part.0+0x90/0x90 [ 1792.505820] ? ext4_da_write_begin+0xde0/0xde0 [ 1792.505823] evict+0x284/0x6b0 [ 1792.505826] iput.part.0+0x4eb/0x780 [ 1792.505831] ? trace_event_raw_event_ext4_ext_remove_space_done+0x520/0x520 [ 1792.505833] iput+0x58/0x70 [ 1792.505836] do_unlinkat+0x3ee/0x650 [ 1792.505839] ? __x64_sys_rmdir+0x100/0x100 [ 1792.505842] do_syscall_64+0x33/0x40 [ 1792.505846] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1792.505849] RIP: 0033:0x7fb1abe80457 [ 1792.505858] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1792.505862] RSP: 002b:00007ffc4cdd33f8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 1792.505870] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb1abe80457 [ 1792.505874] RDX: 00007ffc4cdd3430 RSI: 00007ffc4cdd3430 RDI: 00007ffc4cdd34c0 [ 1792.505879] RBP: 00007ffc4cdd34c0 R08: 0000000000000001 R09: 00007ffc4cdd3290 [ 1792.505883] R10: 0000555555aedc7b R11: 0000000000000206 R12: 00007fb1abeda105 [ 1792.505888] R13: 00007ffc4cdd4580 R14: 0000555555aedc20 R15: 00007ffc4cdd45c0 [ 1792.510033] hpet: Lost 8 RTC interrupts [ 1792.565318] hpet: Lost 3 RTC interrupts [ 1793.489035] hpet: Lost 1 RTC interrupts VM DIAGNOSIS: 10:15:57 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822816cc RDI=ffffffff876d8fe0 RBP=ffffffff876d8fa0 RSP=ffff88806ce08ea8 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0edb247 R14=fffffbfff0edb1fe R15=dffffc0000000000 RIP=ffffffff82281720 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe056286700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2d225000 CR3=0000000044378000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 00000000000000ff 0000000000000000 YMM01=0000000000000000 0000000000000000 6224657469727700 3233666c655f746d YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 00007fe058df77c8 00007fe058df77c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff888008bac040 RCX=ffffffff8126fcf7 RDX=ffffed1001175809 RSI=0000000000000004 RDI=ffff888008bac040 RBP=0000000000000001 RSP=ffff888041807a80 R8 =0000000000000000 R9 =ffff888008bac043 R10=ffffed1001175808 R11=0000000000000001 R12=0000000000000003 R13=ffffed1001175808 R14=0000000000000001 R15=1ffff11008300f51 RIP=ffffffff8126fd6e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555555aec400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffc4cdd2cb8 CR3=00000000417fc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 ff000000000000ff YMM01=0000000000000000 0000000000000000 2525252525252525 2525252525252525 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000