0, SerialNumber=0 [ 286.022491][ T7] usb 2-1: config 0 descriptor?? 15:50:25 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000015c0)={{0x12, 0x1, 0x0, 0xa5, 0x73, 0x39, 0x8, 0x46d, 0x8aa, 0x408d, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xe7, 0x27, 0x95}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) r1 = syz_usb_connect$uac1(0x0, 0xe3, &(0x7f0000000180)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xd1, 0x3, 0x1, 0x9, 0xa0, 0x15, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x8, 0x6}, [@extension_unit={0x7, 0x24, 0x8, 0x6, 0x0, 0x6b}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x3ff, 0x8000, 0x2}, @as_header={0x7, 0x24, 0x1, 0x0, 0x40, 0x4}, @format_type_ii_discrete={0xb, 0x24, 0x2, 0x2, 0x1, 0x7, 0x0, 'g{'}, @as_header={0x7, 0x24, 0x1, 0x0, 0xff, 0x3}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x1, 0x1, 0x9f, 0x8, '0'}]}, {{0x9, 0x5, 0x1, 0x9, 0x40, 0xd7, 0x3, 0x5, {0x7, 0x25, 0x1, 0x2, 0xfd, 0x100}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x8, 0x0, 0x2}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x5, 0x1000, 0x40, "970554"}, @format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x81, 0x2, 0x5, 0x2, '1<5'}, @format_type_i_discrete={0xf, 0x24, 0x2, 0x1, 0x5, 0x3, 0xd, 0x40, "32ba4ba5a84c06"}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x0, 0x5, 0x20, "b7fc1f"}, @as_header={0x7, 0x24, 0x1, 0xbe, 0x2, 0x3}]}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x5, 0x8, 0xc1, {0x7, 0x25, 0x1, 0x1, 0xfa, 0x4}}}}}}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000280)={0xa, 0x6, 0x300, 0x1, 0x80, 0x5, 0x20, 0x2}, 0x4b, &(0x7f00000002c0)={0x5, 0xf, 0x4b, 0x6, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x1, 0x0, 0x7ff}, @ssp_cap={0x14, 0x10, 0xa, 0xd6, 0x2, 0x0, 0xf00f, 0x6, [0x3f0f, 0xc000]}, @ss_container_id={0x14, 0x10, 0x4, 0x2, "750bdc6c09c1e1599ee39c8dfb654be3"}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x2, 0x7, 0x101}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x9, 0xd3, 0x1000}, @ptm_cap={0x3}]}, 0x1, [{0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0xd841d1b2f1d60d}}]}) syz_usb_control_io(r1, &(0x7f0000000580)={0x18, &(0x7f0000000a80)=ANY=[@ANYBLOB="20054a0000004a10dcc4820efc95c254ca05349044344063eac6b039a4e38d50398a0809fc6cfc85dd726dff9548d9d39cd9848855ea761d82851ab93fa6938cc46216cd4b9caaed25be8879f77b99d0a839307799a53347f96b9a2a27a0172dbf5216cdaa819ab6ee48be54cf007d84d776755ab48949a58c9f87bd8ee2e57591d71f7583f07b618ac7e2b60e9aedd32246effd594f9bca5743088018692d2a75764163c6df6f87b6c1bc5edbbc411c2079737e64dc3c74a098909488772bb6d56b5f1375d4ece1f34e1360f834c65b10ace1d4b0ad5e0dbe0b4170432c8489bd480d55a207d06ee6286746fcc949b6210862f6c2e6"], &(0x7f0000000440)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x807}}, &(0x7f0000000480)={0x0, 0xf, 0x46, {0x5, 0xf, 0x46, 0x5, [@ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0xfe, "840ddb5d0a8b77b4eab81415f0f457a1"}, @ext_cap={0x7, 0x10, 0x2, 0x12, 0x3, 0x7, 0x7}, @ssp_cap={0x18, 0x10, 0xa, 0x4, 0x3, 0x2, 0xee00, 0x3ff, [0x7fbe7f, 0x7fbf00, 0xf]}, @wireless={0xb, 0x10, 0x1, 0x0, 0x0, 0x7f, 0x70, 0xa4, 0x7f}]}}, &(0x7f0000000500)={0x20, 0x29, 0xf, {0xf, 0x29, 0x1f, 0x60, 0x5, 0x81, "f3629f0c", "2e1ab76e"}}, &(0x7f0000000540)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0xff, 0x0, 0x7, 0x3f, 0x9, 0x0, 0x800}}}, &(0x7f0000000a00)={0x44, &(0x7f00000005c0)={0x40, 0xd, 0x67, "a5f7fa68789478a6ea05764d13b7df7bca4cedb9d0e79f9201bbbcf565d5191e9e24f3c730a3226c79d4654102fc1ab72c73850720689898248807465ab75ae758ea01fcb2c99f0820c36987ae2d587a5697c6282a8363b20770feb38346db58ce1fddb4788f05"}, &(0x7f0000000640)={0x0, 0xa, 0x1, 0x3}, &(0x7f0000000680)={0x0, 0x8, 0x1, 0x81}, &(0x7f00000006c0)={0x20, 0x0, 0x4, {0x0, 0x1}}, &(0x7f0000000700)={0x20, 0x0, 0x8, {0x40, 0x2, [0xf0f]}}, &(0x7f0000000740)={0x40, 0x7, 0x2, 0x3ff}, &(0x7f0000000780)={0x40, 0x9, 0x1}, &(0x7f00000007c0)={0x40, 0xb, 0x2, "9f14"}, &(0x7f0000000800)={0x40, 0xf, 0x2, 0xec}, &(0x7f0000000840)={0x40, 0x13, 0x6, @local}, &(0x7f0000000880)={0x40, 0x17, 0x6, @local}, &(0x7f00000008c0)={0x40, 0x19, 0x2, "3cfa"}, &(0x7f0000000900)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000000940)={0x40, 0x1c, 0x1}, &(0x7f0000000980)={0x40, 0x1e, 0x1, 0x7f}, &(0x7f00000009c0)={0x40, 0x21, 0x1, 0x7}}) syz_usb_disconnect(0xffffffffffffffff) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x56a, 0x34, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x1, 0x20, 0x52, [{{0x9, 0x4, 0x0, 0x3f, 0x1, 0x3, 0x1, 0x2, 0x76, {0x9, 0x21, 0x0, 0x4, 0x1, {0x22, 0x2cc}}, {{{0x9, 0x5, 0x81, 0x3, 0x3ff, 0x9, 0x3f, 0x40}}}}}]}}]}}, &(0x7f0000000140)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x0, 0x4, 0x3c, 0x20, 0x3}, 0xf, &(0x7f0000000080)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0xd, 0x2, 0x4, 0x8}]}, 0x2, [{0x4, &(0x7f00000000c0)=@lang_id={0x4}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x405}}]}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) [ 286.206604][ T7] usb 2-1: can't set config #0, error -71 [ 286.227289][ T7] usb 2-1: USB disconnect, device number 9 [ 286.387159][ T8807] usb 1-1: config 0 descriptor?? [ 286.468648][ T8807] usb 1-1: can't set config #0, error -71 [ 286.506773][ T8807] usb 1-1: USB disconnect, device number 13 15:50:26 executing program 0: socket$inet6(0x10, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$nvme_fabrics(0xffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) r7 = getegid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x40000, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x3}}, {@blksize={'blksize', 0x3d, 0x1400}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<'}}, {@fowner_gt={'fowner>'}}, {@euid_gt={'euid>', 0xee01}}]}}) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {}, [{0x2, 0x5, r2}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x5}, {0x2, 0x0, r4}], {0x4, 0x3}, [{0x8, 0x4, 0xee00}, {0x8, 0x0, r5}, {0x8, 0x6}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x0, r7}], {0x10, 0x1}, {0x20, 0x1}}, 0x84, 0x0) pipe(&(0x7f0000000100)) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xc503}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1c, 0x1b}}]}}}, @IFLA_LINK={0x8, 0x5, r10}]}, 0x50}}, 0x0) [ 287.335303][ T8807] usb 2-1: new high-speed USB device number 10 using dummy_hcd 15:50:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_netfilter(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x40c, 0x11, 0xb, 0x201, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x1}, [@generic="fea778705776f23527c17290f573025ca4222336cc7629a139a615192849b7f4843d8033dc6282800ba6ffaa65e9eba8e90ea5253affc3274ae901e91ac6fe49d8fb7ea70d414998a94871df9630ab7c2e889471f1f1924ccb80031044be79abccad260b50274068c2cd823c26a04ae945b3eaa538e7a09d835ed0ff6fa2df4a0f471d9b81cf1be62b95c6abcc9685044505efaf4769f8fdbc0906f662b71615535414243b47ecd4da098248ad5dcbb8203bd23b6e983d9124a3a0c2cbbc3f941c3425f863beb660d7117e435178863bdfdb1d3b31fc59f53f4cfeddf3928158c26fffc93287", @nested={0x115, 0x0, 0x0, 0x1, [@generic="5ce44a8544aaf426277a501723685abda35f8b7c73e69d7a1cbd7bd0853eafb12391b1030124afa09cd24626765f76786f212a0e7c0f3dcbc949a3013d500adab5a1663f933caf2af5fa032de811eb", @typed={0x8, 0x6f, 0x0, 0x0, @uid=r5}, @generic="419d576e832e5b473ee10f257ff69e9b1844cfd36ba93e6f03c25529dbecd92d7f02dc547c7fc8a69e6ebde366caf22ed69b663c9d36eb51445c9c7ee79b00b36cd416fb016701281c5409cc58ef7160547470dcf27ed68737690150710e5e2986b7cc848389703909454baf1784c7138ccbe9261f2e35bb434f4d0bc2f1ee032b16156851144e05392fd4139cfa71d1499827c5625f961068d8097b99e93abe0aed9ce812223d832c5f686906cbc46b8714f7ab4225411efafe"]}, @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@remote}, @nested={0xc, 0x54, 0x0, 0x1, [@typed={0x8, 0x27, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x1c4, 0x16, 0x0, 0x1, [@typed={0x100, 0x33, 0x0, 0x0, @binary="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"}, @generic="76c16416d09aa2b14b47db4762aa78dd81e9dfd2600f553e40bb222cc299853c143086c9a5daf1e73f49", @generic="d894cb306e11797b111bc8b03856a4d805f73f99a7aa21246af327365428f1c5710772498e6faf01d03b0478cf78da332438ec3a87e77cb9ee7601c4d46bccb3c6f1fd3fd336343824d8940d4d45036c96156a074f2e881659ec96136d92e193e4fd42e3ddc24ac8d9c2f1ba82d9745db8b8265d8958e0d1e412ef7e76a8feb5ce2d7dfa0bef491ced5db2ffe95426dd845fc6974afa"]}, @typed={0x14, 0x5f, 0x0, 0x0, @ipv6=@mcast1}, @nested={0xc, 0x66, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @uid=r6}]}]}, 0x40c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 287.604976][ T8807] usb 2-1: Using ep0 maxpacket: 8 [ 287.727207][ T8807] usb 2-1: New USB device found, idVendor=046d, idProduct=08aa, bcdDevice=40.8d [ 287.736713][ T8807] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 287.853189][ T8807] usb 2-1: config 0 descriptor?? [ 287.919170][ T8807] gspca_main: gspca_zc3xx-2.14.0 probing 046d:08aa 15:50:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x0, 0x1]}, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x13, r0, 0xefc26000) [ 288.082213][ T9418] device vlan2 entered promiscuous mode [ 288.088027][ T9418] device wlan1 entered promiscuous mode [ 288.176991][ T9418] device wlan1 left promiscuous mode 15:50:28 executing program 2: socket$rds(0x15, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0x4d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 288.694000][ T9418] device vlan2 entered promiscuous mode [ 288.699877][ T9418] device wlan1 entered promiscuous mode [ 288.760128][ T9418] device wlan1 left promiscuous mode 15:50:28 executing program 2: sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x3, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4090}, 0x0) prlimit64(0x0, 0x9, &(0x7f0000000140), 0x0) prlimit64(0x0, 0xa, 0x0, &(0x7f0000000000)) pkey_mprotect(&(0x7f0000ff1000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) syz_io_uring_setup(0x417c, &(0x7f0000000080)={0x0, 0x100000, 0x2}, &(0x7f0000ff3000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000100)) [ 289.401075][ T9406] udc-core: couldn't find an available UDC or it's busy [ 289.408472][ T9406] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 15:50:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_netfilter(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x40c, 0x11, 0xb, 0x201, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x1}, [@generic="fea778705776f23527c17290f573025ca4222336cc7629a139a615192849b7f4843d8033dc6282800ba6ffaa65e9eba8e90ea5253affc3274ae901e91ac6fe49d8fb7ea70d414998a94871df9630ab7c2e889471f1f1924ccb80031044be79abccad260b50274068c2cd823c26a04ae945b3eaa538e7a09d835ed0ff6fa2df4a0f471d9b81cf1be62b95c6abcc9685044505efaf4769f8fdbc0906f662b71615535414243b47ecd4da098248ad5dcbb8203bd23b6e983d9124a3a0c2cbbc3f941c3425f863beb660d7117e435178863bdfdb1d3b31fc59f53f4cfeddf3928158c26fffc93287", @nested={0x115, 0x0, 0x0, 0x1, [@generic="5ce44a8544aaf426277a501723685abda35f8b7c73e69d7a1cbd7bd0853eafb12391b1030124afa09cd24626765f76786f212a0e7c0f3dcbc949a3013d500adab5a1663f933caf2af5fa032de811eb", @typed={0x8, 0x6f, 0x0, 0x0, @uid=r5}, @generic="419d576e832e5b473ee10f257ff69e9b1844cfd36ba93e6f03c25529dbecd92d7f02dc547c7fc8a69e6ebde366caf22ed69b663c9d36eb51445c9c7ee79b00b36cd416fb016701281c5409cc58ef7160547470dcf27ed68737690150710e5e2986b7cc848389703909454baf1784c7138ccbe9261f2e35bb434f4d0bc2f1ee032b16156851144e05392fd4139cfa71d1499827c5625f961068d8097b99e93abe0aed9ce812223d832c5f686906cbc46b8714f7ab4225411efafe"]}, @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@remote}, @nested={0xc, 0x54, 0x0, 0x1, [@typed={0x8, 0x27, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x1c4, 0x16, 0x0, 0x1, [@typed={0x100, 0x33, 0x0, 0x0, @binary="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"}, @generic="76c16416d09aa2b14b47db4762aa78dd81e9dfd2600f553e40bb222cc299853c143086c9a5daf1e73f49", @generic="d894cb306e11797b111bc8b03856a4d805f73f99a7aa21246af327365428f1c5710772498e6faf01d03b0478cf78da332438ec3a87e77cb9ee7601c4d46bccb3c6f1fd3fd336343824d8940d4d45036c96156a074f2e881659ec96136d92e193e4fd42e3ddc24ac8d9c2f1ba82d9745db8b8265d8958e0d1e412ef7e76a8feb5ce2d7dfa0bef491ced5db2ffe95426dd845fc6974afa"]}, @typed={0x14, 0x5f, 0x0, 0x0, @ipv6=@mcast1}, @nested={0xc, 0x66, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @uid=r6}]}]}, 0x40c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 289.535241][ T8807] gspca_zc3xx: reg_w_i err -110 [ 289.771363][ T9443] device vlan2 entered promiscuous mode [ 289.777399][ T9443] device wlan1 entered promiscuous mode 15:50:29 executing program 2: r0 = syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000002e00)="e2e1f5e0b982a38e010000000c0024000000000000000000e8030000000000000000000002000000000000000000000000b05f4692a64cad96452dd70d29f82d0000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000c04100007400000000000000ffffffff000000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002400000000000000540002002400000000000000550002002a00000000000000570001003000000000000000600002005b00000000000000650001005f000000000000006a0001005f000000000000006f0001002e2e2e66696c652e636f6c6466696c653066696c653166696c653266696c653300000000000000000000000005000000ed8100006400000000000000ffffffff010000005cf90000535f0000e80300000000000000000000010000000000000000000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c6572730001000000000000000000000000000000000000000000000000000005000000ed4100003d00000000000000ffffffff020000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000003000000000000000300002002400000000000000310002003400000000000000330001005700000000000000380007002e2e2e66696c653066696c653100000005000000ed8100001a04000000000000ffffffff030000005cf90000535f0000e80300000000000000000000010000000000000000000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b618a6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c00000000000005000000ffa100002600000000000000ffffffff040000005cf90000535f0000e8030000000000000000000001000000000000000000000000000000000000002f746d702f73797a2d696d61676567656e3233373235313139322f66696c65302f66696c6530000000000000000000000000000000000000000000000000000005000900ed8100000a00000000000000ffffffff050000005cf90000535f0000e803000000000000000000000100000000000000000000000000000000000000000000000000000000000000060106007861747472317861747472310601060078617474723278617474723273697a6b616c6c6572730000000000000000000007000000ed810000282300000000000001000000060000005cf90000535f0000e803000000000000000000000200000000000000000000000000000000000000000000000100000000100120000000002803000001000000000000000000000043c804128cf7970a35cc7b259c580af9e9e1eb2e4a6dcb648bc6fe183501e6b0ba9a3b2ab718bc9f3941c7daf38219020bd61c9a303e4e08ea7df825da9c4ad6d6c2ed23950e67bc866bdf3bcf1b90bc41770e653a0324e7a7cabc65d0824b7c576a39e06d0c70e2ef5150e2064b94e5000000", 0x8b0, 0x80000000}, {&(0x7f0000010900)="0000000000000000000000000000000000001f000100ffffffffffffffffffffffedffffffffffffffffffffffffffffffffffffffffffffff32500000000000", 0x40, 0x400}], 0x1202808, &(0x7f0000000080)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x401, 0x4, &(0x7f0000000180)=[{&(0x7f0000000240)="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", 0xff, 0x3}, {&(0x7f0000000340)="f6e9d65a1692925da2583b3964986fa7facda3f78ab1a40274340ed8ab89067a48cf4efdd811a207b531fbc0e411dfd9e1c951eb0ca7b0dcdec76a7cc43ec318f59664e48cdff065d1a7c31ec26392b9c924133824f2a9e6a30a4e5c4273fff331906d830f140811be291f47c8c47f84a0525a0ddde18b8a4aa3a412beea22c3290d24b31eb8a62b70227bc557eb05272d16cd1f347a69c7d373536938109cc5af4dfc12a1a120ee2534fdbce9c226702128da952afffd0c7701c6192c27ae", 0xbf, 0x7}, {&(0x7f0000000400)="3e6433a19cd74f332aaec22d454ad743fc615881c06a894f3c9d8567e9cbee57ad9e844ec4dec7d5b83471e7eaec07d9fc2d84356c0d945cef97da1a824396ee7212359707da7c7891d83ab9cb9c9c6fa683b408af7090857b8f33c2ac11aba49ad1e8f3bdb72340de46501c4a86ad7570f83876e30d6744d85c96b6b4adf8a601ee894ad13089e4d6095ef7a36587d569df64f4826f357eb35a031d8a51639e0370b257ee35ac4c2fefc016deb27e4ce98d2c7956053d020a4a38a35255906d0532152d923191483a7bf23acc4bb75748eced0981d71289278510982ba6ca9f3c3867c40f4053864eeab0ddf63c5a574c5ebccd4732eac7cbbe7d1384ed1abd8c6974bb994d4d2065785fb02ad63500bb41273bc24f68cbd357fcdfa890c10cd5f8d3ac47b287893cba7aebed08f451aff0794d14fea5da687c1e7c713de32b7cbbd830b0ac7480052fea508f9c1c0e92e66bb267a0b91bf86c652a66972f65448be7338ba2105f1aa4bbad8c6fd38ee531426eac94b32f76eba53777bacaa2186358265b793e863e1feea7da9540a9ad3a89794477b5ffa4cdf33451baf81a320b37a02ee608a426ae27a715150207a178a4c12f99beb3c778be0e13b7c421539ebe27393b171ddcec14898e5ffd404ae3f980a9566f55602f11561e592aa8bc1a94b128433ba442f0aa24d050997485df42b62052b35379807b1e61055062680a88dc1510f7694b6c10d72161cfa547d60c19ce573770e48f858363488edc2c2b63a201193b6ef3016dcaffdd0a2bd3a96b27167fc2234feb0777fe8faa1540d425760afec0cc4b89a5f9129c3ce138f4bd9e49dcd322588bcc8a72fe185b73c6870789b6d3e4c9ba9aab743eda2cc79c0ca79d15f24dfca00ba4787ac6812c6a80064d73696c64e8d390247f93c7d09c99c433efd62d1e183970ea7083b2bbe2d19153c0f047d7de86bfd0ee2a9e9de714e610be6c83345970d3b8c0ba9cd9896b627852d99df917940995c12c35198c14a234a180ef7a73a2c9368705fe2ed32ecbb1333b465fbe26b5bca62e9387210f17215dc2eefe460d347534ee9ce5383631eccd9ee2423a9659d0e05139ef9484dfe1531301b4830f632cb1cfd4d85d039f4a60a072ebd6c952ce1b9fd7c91934e47913a262f404999871ca7d47633b6e7b676906110dffc9fdb358e6f674fca26da9f4c58c8ac89d29e72c59c94aadb056eb97fd399bb73cf661a8fed39c9a024a56f282a73bc699423c364bb0249a495359249f2f07778cf9ad6dcc7571a6b89504f24ed1e9826444cd07ab1082a8cc4970a870db5c0869c80d077f1699269538320ddce8b43d09ed5600536e2a841aa089211e8728f006fd428c4fa0ce1bf818f62c8150899e4f0cc35f64449871b3701c7328bf0e681a7d5f7731b338b84c72426732df1452f27870b5c1619fbfc13dfe2901e89c26ee224a783c8f148af966caaa80655a0148aa119501a5d8aebbbd1af970efeec80c9ec229f219b8d2ddadf6bab500a1fd2de8abf9c45cf25dcb5c27b5b8e5539e286ae80a3f0327a6f28fcd1abc7f91891e2a0203bb4f01fcd9b77ea05d11f89b9fbf8ab6d2a09f57c67eae2307e1c9203aa03fef852bfeff3c0363916175a9a891992047611f5a90c15fd31c47ee1b0fee8a8857830c4a971cc293c5be9a5b8e7c76e10ae8e4054047152644cbc8672993dcc62562f2dc212e1fef05f1a6a24ee87d2c312c1a0b362cb8b57c6e1a2734947f78090d7c0a4f22458c5f99e6385c2f738c572734e13135e660f2a046d847d804eee329ec96094aa03332ae09bd9b12c3669a545e48b3a6d1fb6aad36410df9a6e30515151980ec72b8a4487a7def0bde6b3dca1a32ed50f05f9be8eb6291914325c82720ede69d8ee0310114bfc8b3e98fd98c4b7d0175ecbaeaa3b72c61d29e9ed7a7253b5dd7de5c6cfdffb928e2ee0b533dabe385dbbb0b91a2119408fecc71598baafea3f611df4e95f3b7927209bbdfc74e4433e4b61706f45579424102639d8ec55ac80c29c9d92d55eee40ca1e36e4ef809ec04c6b659524862f8b763a23ad33392b59733ad237e667fa320f584c5f9ff8cdf6b841271ad2c6c3c9124b477e250b5558a86dc54ab7692b42d42ed447f7f22c3e52737da3082689ca1fc7a3867aaddad7ba68ed0cefd4f4110e50c6ef9c2132b427cad0f1a6247c78869c3b9087ee363532ff31af1d526480b3c3333a5e4311198e29f3af4d118ccfcce3ecf82628ce55d6d63885af7537c0ef0ba577c5fd83959dff512101567b141239e503a2c0a3e3e7316bcd240dd1a841d16db67bcaf34c3a289ddd2570102d3f4840cf9155a9f43f6b47c8090daa1a6c1f66373447cdb50edcb944f37f0e47b1d02803bb9ac10900c6bd0eb47f3a2ad290da3a0b56c4d57d9438659bfde0c0f0fa59fbd4ff4e2a48366146a4be302b7421975db728a59344556b4054787ba445fe50af0f8ffc9e2cf1673e656d4fdd6b16b16963ce077b55ea32343c685803eb59a7151c9173f8578edf6758b10e5128206631d6dea24c3a2eb5a993626e31dd70b6f61d6e3414a31829eb5bdb02f45b49aefd414b4101b09ac61341909bbc7834641b0b0335357254238202c2e4840882565046394c2ccbd5f04ce323f2b81fdd4e443126923d98d11a41cceb07975a7bdf2af82dfb0103addc3f2144ed7c067232cf0803c9ca77c46d1574f470ce03f314e262b02ab90a2919d67e3216ce5cc8a1d83602b1a6a301ecda90effa4ce0af78fccb8bb21fc4af60e8717a8c6404b01b4c8db13442bb446408612e8c1fb1a62e24aa1d5d09eaf140826ff53e2cf299ca51fd915816a1494eca8bdd9fac4003eac59352ce37ffad50ac860991500394ffadbf105eca07e37d07931ab91222123e8695ab61c053cd23f3fd784c848b5bdda97af22815770c669c018da46d8a29d046eeeb54fc65ca22fca22fa4154f92c7d4089693f97f75d57d7c7cd36fdb5c7c5c1d273187b8f0073bb89c8d044bac18d0fe11010685a8e2e011e7350118e6bcda7573eab9f879c2c07639539e23861c67093e632e00354cf99185c5914f49bc8102192d57f46b73ba3701c43db1e0eb3b1b3105f18f42aeb94ba60305da023067d5c9a84f960432fe210c040c76d5b31bbd7f6f9951207c84f65312ce4572668707710d7e6b59118988715bbb57f265cf7a54118c6522b959900a1faa3c58c10e99cb5666f36a8e42399a15518c68079660545bcefeacac152bc02463f0dddefb0473e5cc6e4059090573ebaa0c8c0e1385e3d5b9f6b513d8a23da3c0b622a994c210857c7ae25cbb048d31ea6bdac8efc6eb7981edcd089869e20d0f3c00fc2ba20011e9d3a1ba11e5d480beb9726188fd812f991688575fecb6edb534b1edffafa06d4b253b52764280190271cfdcca48b9989dc222552e9b892daee7d2736da25a4013b8d6589e8a2d424dc5a354b794375eafac17ed767d2b85ccc018413164675dc1d78f8f91ed4e5e22d31856719e77f74110b0560fd938a35e8855f0bb49b88073472d6f9dc9e3df294078317e9ad14b7532d87e968df94f6fae7ce4d87fa50d1bb57f09278ba6c87c72ee3107014b620978d0352f2233d705f0f564c3221274207e6f951d8fb82439240c2a5cbc38c6a100d258ba378193ad503aa0b820d2edb0bb374773cde05a965a8074a7362a3736b5c9acd888942971ee46905c428523692f3e798e91fb4210942baebb3bf0da19dd50b95d3c9ee6a2d0f80907346f4173564a7c44d8394b7911025b68e1d7b5e4579bd753f3e6fd933c5216bba5ada60e67e51ef75e3fae7d31afa68c044643bf999e53c50b5d9d1daa420f61eed5cf079fa34396130a2fd178d8e94f52756dd37aba6fa189124f77099fe2cbf57921ffbae370dc393cc6c6d4a4bd09e9acd690a89416f1239f751e730d093397c8393fd0a682a5a84226f15099a7f00985a69c5e643854dd9ebc927eb35616d0a99b081dbbce663b36404ddbb401223291bbc550eaf49b70a27669ab8a8331ddc9a721fa225bd13b933ceb9fc5fa2b0c326f52e37490d78ded8a96ff2b8f1e729c912a91440bd662ade5a5e9e5ed00a0ae542215db43a54ec65f32ee7326a33f11bd486a3669bed11848f33eef1b8eeb0a2938387a132e827bfa019bcaa72d89775430c6a446dbe135d1597df531eda72f2f83db607d88e96b3eda7e3dcb488c1630276153b039998c1c56900bdb0cf30e6ee59fe6f3305d00cf648366c898efbfc0931ecd20b2319224b136d66a3b759e16e41200121c5566dbaea958026f6429c09f66f132a12e65dd4ac1d7b49d7af667d557ce2cffd12e0ee71991cb1c5767577e1bee0615932bb19faac524e48ec7faabb873bba79ede84c893cc6f5adab30502f2b088ce7f4fdbc6d1dd092e03194ee9fa68c8d9ca8af2eb58849e79d0195e24c1ec9c1c8e5659fd7520228059d4960a0ad6633e1a39a3e6ab4eb91f1324ced281aaf8d35d72ff734f08cfe2ebf5b2ce1ab2e0a13064b5993def973c61d8bad47f8fede10edd1254821071dd47b0ae09fa637cdf700aa7bfa00e418472ca885ec244ff1f742b7bd3062ce9073966301d781aa0ecd8803efd5ea9130f7c3481c5300c3bcb79a879e076decfba60a5a4182ee62124a92f3551135d921fd91b9c7ed930f7605bf3d41d4e4fd406b5b7e95a3dbac64e0ecb83778cc149a37349fdf788ab644ffa010f77c002d11d91c53ac2388b9f8f37d2a2bb2f9d912a6da0c7a59f394fe4d455a5697d50d648f7b143ad9709b1ac5de45e4ec3db1090e63c592f907d1e611bf18c43750074a7ff76b5bc890a3169bb3ae8d8a0db36f339e4dcb3b5d93cae645a877f9abc70eba0ceea2fcd76366985c3ec9b0dd24a9dbc9317bce066842c347d40555f281aa37ed12bae4900676bce89741170012ee469e8eb4f5df649ef7d65b081959d1ef222c6ecae3a15fa4dd5d36e6a463cd01818f6ae9a43d1d9720521837ddc6a280e09957cba3f432ace4773aa15ab1dfc4931b4d66abc65c2025a7a88a346553b393f08af67df56b9e0cb9ade525b1998602ce5df5abdedf46fca1b22138357de3ca1d23f9dee8bebc140c96582de989bc0dd5258599f594dc1215c93d99189d906b87494d9a5a145955bbff44ec18fb03a72b850baaec9bae0023b2f101688789b874e11b0edcd7cff9f2ae895e5401cdc0f46f4d1aa9f1fd4956cca93add5cfc5cb249095277180cb8cf9232b4bfa075baea5c1dce04634a5a9519ace7816f04db6fb7d1215a9405ea72758a8d9fda1eaccdcf5fd9ae52ce5c21886e931a28188b90fe2f615c1345429214c5bd05eac2216e1a96e4922f947b0c556bd73162fbc1ddbb4b95d247319e6cacab15d63a699e6c479ec3a2d24399b69c82c261cfb43f9efcec0de3945321d022a28b197d9adf3c76771bcce663e1c376de47f4410d1c65cf347756edacce0090870bca6574a6123a76f9a2a575579baa9dc619e430c66717a774fc08de6f056bda7372399a22244e37e0aad0191992fdd429ea58665f26c128e656507b9ab85b2abe1502bebe58535aa5c520d76f09e92a898c66dbe914a192d5d3a1e47a73827fa313ef02d6682da2fce675655112252907c22430f0cf25368e691e2829a07905ea998b7d68a101b0d8f340a5c50237adda95ea5a15172898ef7cc5ed820baf137c47895cb6d95b3a8cf526f98bea090e718414a5cf1010166d48f8c7f1b9d60648fbdb3dc4f2598952fd150a797271019e96817257b0", 0x1000}, {&(0x7f0000001400)="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", 0x1000, 0x4}], 0x100a000, &(0x7f0000002480)={[{@fsync_mode_posix='fsync_mode=posix'}, {@inline_dentry='inline_dentry'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@fsync_mode_posix='fsync_mode=posix'}], [{@obj_type={'obj_type', 0x3d, '!^\\$}@$\x11'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x34, 0x34, 0x62, 0x36, 0x66, 0x64, 0x31], 0x2d, [0x35, 0x32, 0x32, 0x35], 0x2d, [0x63, 0x34, 0x65, 0x30], 0x2d, [0x37, 0x63, 0x61, 0x61], 0x2d, [0x32, 0x68, 0x65, 0x63, 0x30, 0x38, 0x35, 0x31]}}}, {@dont_appraise='dont_appraise'}, {@euid_gt={'euid>', r1}}]}) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200603, 0x120) [ 289.848722][ T9443] device wlan1 left promiscuous mode [ 290.049270][ T9446] udc-core: couldn't find an available UDC or it's busy [ 290.057584][ T9446] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 290.186366][ T8807] gspca_zc3xx: Unknown sensor - set to TAS5130C [ 290.193000][ T8807] gspca_zc3xx: probe of 2-1:0.0 failed with error -110 [ 290.226128][ T9449] loop2: detected capacity change from 264192 to 0 [ 290.347082][ T9455] loop2: detected capacity change from 8 to 0 [ 290.428827][ T9449] loop2: detected capacity change from 264192 to 0 [ 290.498082][ T9455] loop2: detected capacity change from 8 to 0 15:50:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_netfilter(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x40c, 0x11, 0xb, 0x201, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x1}, [@generic="fea778705776f23527c17290f573025ca4222336cc7629a139a615192849b7f4843d8033dc6282800ba6ffaa65e9eba8e90ea5253affc3274ae901e91ac6fe49d8fb7ea70d414998a94871df9630ab7c2e889471f1f1924ccb80031044be79abccad260b50274068c2cd823c26a04ae945b3eaa538e7a09d835ed0ff6fa2df4a0f471d9b81cf1be62b95c6abcc9685044505efaf4769f8fdbc0906f662b71615535414243b47ecd4da098248ad5dcbb8203bd23b6e983d9124a3a0c2cbbc3f941c3425f863beb660d7117e435178863bdfdb1d3b31fc59f53f4cfeddf3928158c26fffc93287", @nested={0x115, 0x0, 0x0, 0x1, [@generic="5ce44a8544aaf426277a501723685abda35f8b7c73e69d7a1cbd7bd0853eafb12391b1030124afa09cd24626765f76786f212a0e7c0f3dcbc949a3013d500adab5a1663f933caf2af5fa032de811eb", @typed={0x8, 0x6f, 0x0, 0x0, @uid=r5}, @generic="419d576e832e5b473ee10f257ff69e9b1844cfd36ba93e6f03c25529dbecd92d7f02dc547c7fc8a69e6ebde366caf22ed69b663c9d36eb51445c9c7ee79b00b36cd416fb016701281c5409cc58ef7160547470dcf27ed68737690150710e5e2986b7cc848389703909454baf1784c7138ccbe9261f2e35bb434f4d0bc2f1ee032b16156851144e05392fd4139cfa71d1499827c5625f961068d8097b99e93abe0aed9ce812223d832c5f686906cbc46b8714f7ab4225411efafe"]}, @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@remote}, @nested={0xc, 0x54, 0x0, 0x1, [@typed={0x8, 0x27, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x1c4, 0x16, 0x0, 0x1, [@typed={0x100, 0x33, 0x0, 0x0, @binary="6a9a4b65b6a29384b8010c700930e8813bf081e52dd293ca70dfd37d6a75ad864e213045b0316d198a5f2d7bef369eb7ab5cf77f2c2a67c53f2468d64bc4a9bca78d14dc30c0b52d3be70fe6cfeb69ddc87f4549254b6a47a67d958abd8d46fa5fa4bbf16464b92e569d4a83ae42ba2991dad02cacc2dd6cce6dcf2323af7e3350b40726e48b3b8b06693e7cd8ded01d26a91d83c9d6e2abed565a54f5e8763d0b99b67ad83ffadfdc77b2ea248c1351676dc44340539bfab4ca42785568cd00a697f0670b49e0b4ead6417644f262d52374d89c006074df432cdb33f7323864b757e86607fca3d1aecba921f5b67f6f2c7f7bb0279c468df36d480f"}, @generic="76c16416d09aa2b14b47db4762aa78dd81e9dfd2600f553e40bb222cc299853c143086c9a5daf1e73f49", @generic="d894cb306e11797b111bc8b03856a4d805f73f99a7aa21246af327365428f1c5710772498e6faf01d03b0478cf78da332438ec3a87e77cb9ee7601c4d46bccb3c6f1fd3fd336343824d8940d4d45036c96156a074f2e881659ec96136d92e193e4fd42e3ddc24ac8d9c2f1ba82d9745db8b8265d8958e0d1e412ef7e76a8feb5ce2d7dfa0bef491ced5db2ffe95426dd845fc6974afa"]}, @typed={0x14, 0x5f, 0x0, 0x0, @ipv6=@mcast1}, @nested={0xc, 0x66, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @uid=r6}]}]}, 0x40c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:30 executing program 2: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x32, 0xfe, 0x2a, 0x8, 0xccd, 0x10af, 0x9bae, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xdc, 0xd9, 0x56, 0x0, [], [{{0x9, 0x5, 0x84}}]}}]}}]}}, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x18, &(0x7f0000000300)={0x40, 0x0, 0x1, 'r'}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, &(0x7f0000000b00)={0xc, &(0x7f0000000a40)={0x40, 0x0, 0x5b, {0x5b, 0xb, "a12179e5a2a70372f969ca2ffacabbc46c1a028a09fb94b652f93c6fc784eb403b46f65d9ffe7169ff9f3047c2f21e89355f5882e1d4185a0f7b7f7326702f0267544914669d2bfd0ffd965800e7993bd04529feca020dbfba"}}, &(0x7f0000000ac0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000c80)={0x10, &(0x7f0000001440)={0x20, 0x14, 0xa6, "d797e9cdd839f55b2f094c32716f66ca8b4ff1be3770d2677d7b05b902796af811799839ba5a59ea002ea4d74e9d99d15b339ca5513982c9f1340d7529a567c59906d8c867530d59fb7d1a62bc0e98787a778d89675faef618ca65983c5428c3a0601ff0829e28e7e2c2902fa8e26a575ec61eba29f106322320574034e6e797d9ba49892fdbea7330d4da2573d60cb5c320523c0e0fa649abcf1c91a270252af7b098e345a1"}, &(0x7f0000000c00)={0x0, 0xa, 0x1, 0xf7}, &(0x7f0000000c40)={0x0, 0x8, 0x1, 0x4}}) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="120100008ab76a08720c11004236000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r1, 0x0, &(0x7f00000003c0)={0x18, &(0x7f0000000200)={0x0, 0x0, 0xa, "589d24d3aa72912c1b4d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r1, &(0x7f0000000900)={0xc, &(0x7f00000007c0)={0x20, 0x10, 0xc4, {0xc4, 0x22, "359f92c3c6df77f1a247ca8154f8b27c7b16f3f2e0263672a0360606aed380c70c1ad149e3bc9a54a6a9bb92104d81e558d6343822c1061876eb8a6b927c1adc3fb6add4aaa37488553abae0eb6c517e201f6cefcdaa2dc20288722f1c35fc8aac66a62c794db5d8e92084fac2535971c0e1dd971d3a392d9d59bc6e83c084d2061d2a89b5d7cd3406cefd14b4bb62f5bfd56523fd77b4ac95ba8c0b7d01229b3dc23842d16ba3868f23744eadf37a9e4a4f34cd344d3eef9fc97e556087c886be6b"}}, &(0x7f00000008c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000a00)={0x10, &(0x7f0000000940)={0x20, 0x5, 0xb, "9dd894f703fa0a61b80e21"}, &(0x7f0000000980)={0x0, 0xa, 0x1, 0x20}, &(0x7f00000009c0)={0x0, 0x8, 0x1, 0xf4}}) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1e7d, 0x2c24, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0xb, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x6}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, &(0x7f0000003400)={0x24, 0x0, 0x0, 0x0, &(0x7f0000003340)={0x0, 0x22, 0x9, {0x9, 0x21, 0x0, 0x1}}}, 0x0) syz_usb_control_io(r1, &(0x7f0000000f40)={0x18, &(0x7f0000000cc0)={0x60, 0x4, 0x2f, {0x2f, 0x8, "665d8156eff9b576e3a432ae905a1ee05f8add180faa52c2b48a3ad18a403be6a1e8047a047701792eb3e4b2bb"}}, &(0x7f0000000d00)={0x0, 0x3, 0x4a, @string={0x4a, 0x3, "d5b208c582bde7b0e42625f65a31d87ff366902494f585d55030460e65fdcd7255685eb8390aeb4f7c5209941ee4b08cf4bc80a445db6350466d7ef4e1a1c331e49e9f5c7e61f1e9"}}, &(0x7f0000000d80)={0x0, 0xf, 0x125, {0x5, 0xf, 0x125, 0x6, [@generic={0xb5, 0x10, 0x0, "b5242107bf14ad95a67d4a793876f61ce8908e445d9dcd4c1d9c84de2769bbdeb9dae44bb2e80a33167c82cc01468ef9c0f84f7320ca87530d70860a435ce5394a999be603f7eeb1b61cffeeec31efa98079a5ecd9036b9bb893894ed6a8fc9c6483da226b7bc955f13b2c3744f72b362e99932799743a795ce6dd1eebfeaa41a49b44b924815ea4bdcb37180b4e64087ffb3c92a1b9e9dd0dfdde8a24d9a4cba5e0a319a5e7780683764152c42727dc2ffa"}, @ss_container_id={0x14, 0x10, 0x4, 0x5, "f97d09da7fc60f2d35e99a9a17f72c63"}, @ssp_cap={0x14, 0x10, 0xa, 0x8, 0x2, 0x0, 0xf00f, 0x8001, [0x30, 0xc00f]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x31, 0x0, 0x2, 0xffff, 0x9}, @ssp_cap={0x24, 0x10, 0xa, 0x5, 0x6, 0x3, 0xe108, 0x7, [0x30, 0xffc0c0, 0xff00c0, 0xc0, 0x3f00, 0xc000]}, @ssp_cap={0x14, 0x10, 0xa, 0x0, 0x2, 0x9, 0x0, 0x800, [0x0, 0x3f00]}]}}, &(0x7f0000000ec0)={0x20, 0x29, 0xf, {0xf, 0x29, 0x0, 0x0, 0x8, 0x4, "11177611", "248258f6"}}, &(0x7f0000000f00)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x8, 0x5, 0x4, 0x7, 0x1, 0x11e4}}}, &(0x7f00000013c0)={0x44, &(0x7f0000000f80)={0x20, 0x17, 0x4b, "98adf52b01ad7aeda57f86dd92ccaaf9d16801efea0ccc6b0bc9ba93bb8ff78d765874ee9da2a094cc8d1f781836c97e7653f3580ca3117d4fac6cd2496616c8c87f8ad4c5769d8b27aab3"}, &(0x7f0000001000)={0x0, 0xa, 0x1}, &(0x7f0000001040)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000001080)={0x20, 0x0, 0x4, {0x2, 0x1}}, &(0x7f00000010c0)={0x20, 0x0, 0x8, {0x1c00, 0x2, [0x0]}}, &(0x7f0000001100)={0x40, 0x7, 0x2, 0x6}, &(0x7f0000001140)={0x40, 0x9, 0x1, 0x6}, &(0x7f0000001180)={0x40, 0xb, 0x2, "a339"}, &(0x7f00000011c0)={0x40, 0xf, 0x2}, &(0x7f0000001200)={0x40, 0x13, 0x6, @local}, &(0x7f0000001240)={0x40, 0x17, 0x6}, &(0x7f0000001280)={0x40, 0x19, 0x2, '\tj'}, &(0x7f00000012c0)={0x40, 0x1a, 0x2, 0xaffc}, &(0x7f0000001300)={0x40, 0x1c, 0x1, 0x40}, &(0x7f0000001340)={0x40, 0x1e, 0x1}, &(0x7f0000001380)={0x40, 0x21, 0x1}}) syz_usb_control_io(r2, &(0x7f0000000200)={0x18, &(0x7f0000000000)={0x40, 0xb, 0xfffffffffffffe5a, {0x21, 0xa, "109b4f74716095bbbb8c13c90b54c4e43c0dfd8c713537651c93fb09ea96e8"}}, &(0x7f0000000100)={0x0, 0x3, 0x8b, @string={0x8b, 0x3, "2174f9c0f593893b349d4b801928a473f0694589301136190b04fa78e513d52db89b9d8e287cf04fad0fbe6aaba71582c839f392e1753a1623470281373549c8797800bbe15458456df662cbee3dbe49b06a6037d92053b46d74d263f9ca47e46e90150b1ddd561f30f72363f416854d8c95e8f2977a93772792caed160eb0af71288db9d5212e2d14"}}, &(0x7f0000000040)={0x0, 0xf, 0x8, {0x5, 0xf, 0x8, 0x1, [@ptm_cap={0x3}]}}, &(0x7f0000000080)={0x20, 0x29, 0xf, {0xf, 0x29, 0x4, 0x8, 0x8, 0x8, "d0db8b8c", "8c206e12"}}, &(0x7f00000001c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x18, 0x6, 0xc0, 0xdd, 0x9, 0xdd}}}, &(0x7f0000000740)={0x44, &(0x7f0000000240)={0x0, 0x31, 0x96, "712ee429e1d57fc9b319a6a711e83d109a7add6c52bdbc97be919844290b2f8dd08623bb9a60558353d6638d6e71c0da3ab92d47015578d7537784c60faa1ca5ac6e225a0955ff141b284330a678cacdcbc5514d36afeb7db25823e6459d92a9cbc35a0ac7dd9371d4a97d1c74d5149f751842895706dddf45d74b39f441b4a5bfd1d2df3ee6ca4f478b6b358c4c6d6ad44e0ae7021d"}, &(0x7f0000000340)={0x0, 0xa, 0x1}, &(0x7f0000000380)={0x0, 0x8, 0x1, 0x3}, &(0x7f00000003c0)={0x20, 0x0, 0x4, {0x1, 0x1}}, &(0x7f0000000400)={0x20, 0x0, 0x8, {0x0, 0x36, [0xf0]}}, &(0x7f0000000440)={0x40, 0x7, 0x2, 0x4}, &(0x7f0000000480)={0x40, 0x9, 0x1, 0x7}, &(0x7f00000004c0)={0x40, 0xb, 0x2, "0fcc"}, &(0x7f0000000540)={0x40, 0xf, 0x2}, &(0x7f0000000580)={0x40, 0x13, 0x6, @remote}, &(0x7f00000005c0)={0x40, 0x17, 0x6, @local}, &(0x7f0000000600)={0x40, 0x19, 0x2, "8c9c"}, &(0x7f0000000640)={0x40, 0x1a, 0x2, 0x2}, &(0x7f0000000680)={0x40, 0x1c, 0x1, 0x80}, &(0x7f00000006c0)={0x40, 0x1e, 0x1, 0xfb}, &(0x7f0000000700)={0x40, 0x21, 0x1, 0x4}}) [ 290.929935][ T9469] device vlan2 entered promiscuous mode [ 290.936483][ T9469] device wlan1 entered promiscuous mode [ 291.010455][ T9469] device wlan1 left promiscuous mode [ 291.494778][ T8807] usb 3-1: new high-speed USB device number 2 using dummy_hcd 15:50:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_netfilter(r3, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x40c, 0x11, 0xb, 0x201, 0x70bd26, 0x25dfdbfc, {0x7, 0x0, 0x1}, [@generic="fea778705776f23527c17290f573025ca4222336cc7629a139a615192849b7f4843d8033dc6282800ba6ffaa65e9eba8e90ea5253affc3274ae901e91ac6fe49d8fb7ea70d414998a94871df9630ab7c2e889471f1f1924ccb80031044be79abccad260b50274068c2cd823c26a04ae945b3eaa538e7a09d835ed0ff6fa2df4a0f471d9b81cf1be62b95c6abcc9685044505efaf4769f8fdbc0906f662b71615535414243b47ecd4da098248ad5dcbb8203bd23b6e983d9124a3a0c2cbbc3f941c3425f863beb660d7117e435178863bdfdb1d3b31fc59f53f4cfeddf3928158c26fffc93287", @nested={0x115, 0x0, 0x0, 0x1, [@generic="5ce44a8544aaf426277a501723685abda35f8b7c73e69d7a1cbd7bd0853eafb12391b1030124afa09cd24626765f76786f212a0e7c0f3dcbc949a3013d500adab5a1663f933caf2af5fa032de811eb", @typed={0x8, 0x6f, 0x0, 0x0, @uid=r5}, @generic="419d576e832e5b473ee10f257ff69e9b1844cfd36ba93e6f03c25529dbecd92d7f02dc547c7fc8a69e6ebde366caf22ed69b663c9d36eb51445c9c7ee79b00b36cd416fb016701281c5409cc58ef7160547470dcf27ed68737690150710e5e2986b7cc848389703909454baf1784c7138ccbe9261f2e35bb434f4d0bc2f1ee032b16156851144e05392fd4139cfa71d1499827c5625f961068d8097b99e93abe0aed9ce812223d832c5f686906cbc46b8714f7ab4225411efafe"]}, @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@remote}, @nested={0xc, 0x54, 0x0, 0x1, [@typed={0x8, 0x27, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @nested={0x1c4, 0x16, 0x0, 0x1, [@typed={0x100, 0x33, 0x0, 0x0, @binary="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"}, @generic="76c16416d09aa2b14b47db4762aa78dd81e9dfd2600f553e40bb222cc299853c143086c9a5daf1e73f49", @generic="d894cb306e11797b111bc8b03856a4d805f73f99a7aa21246af327365428f1c5710772498e6faf01d03b0478cf78da332438ec3a87e77cb9ee7601c4d46bccb3c6f1fd3fd336343824d8940d4d45036c96156a074f2e881659ec96136d92e193e4fd42e3ddc24ac8d9c2f1ba82d9745db8b8265d8958e0d1e412ef7e76a8feb5ce2d7dfa0bef491ced5db2ffe95426dd845fc6974afa"]}, @typed={0x14, 0x5f, 0x0, 0x0, @ipv6=@mcast1}, @nested={0xc, 0x66, 0x0, 0x1, [@typed={0x8, 0x3d, 0x0, 0x0, @uid=r6}]}]}, 0x40c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 291.707068][ T8456] usb 2-1: USB disconnect, device number 10 15:50:31 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r1, 0x37bb9000) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0xc0109428, &(0x7f0000000000)={0x2, 0x10001}) fcntl$setown(r0, 0x8, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000040), 0x4) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f0000000180)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/119, 0x77}], 0x1, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) r5 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r5, 0x34) ptrace(0xffffffffffffffff, 0x0) [ 291.757612][ T8807] usb 3-1: Using ep0 maxpacket: 8 [ 291.887266][ T8807] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 291.897509][ T8807] usb 3-1: New USB device found, idVendor=0ccd, idProduct=10af, bcdDevice=9b.ae [ 291.907010][ T8807] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 292.025118][ T8807] usb 3-1: config 0 descriptor?? [ 292.073276][ T9484] device vlan2 entered promiscuous mode [ 292.073897][ T8807] em28xx 3-1:0.0: New device @ 480 Mbps (0ccd:10af, interface 0, class 0) [ 292.079296][ T9484] device wlan1 entered promiscuous mode [ 292.090011][ T8807] em28xx 3-1:0.0: DVB interface 0 found: bulk 15:50:31 executing program 1: ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone3(&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000580)=[0x0], 0x1}, 0x58) [ 292.191647][ T9484] device wlan1 left promiscuous mode [ 292.375120][ T8807] em28xx 3-1:0.0: chip ID is em28178 [ 292.626645][ T9474] udc-core: couldn't find an available UDC or it's busy [ 292.634323][ T9474] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 292.771178][ T9474] udc-core: couldn't find an available UDC or it's busy [ 292.778830][ T9474] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 292.795904][ T8807] em28xx 3-1:0.0: reading from i2c device at 0xa0 failed (error=-5) [ 292.806401][ T8807] em28xx 3-1:0.0: board has no eeprom [ 292.958225][ T8807] em28xx 3-1:0.0: Identified as Terratec Grabby (card=67) [ 292.966085][ T8807] em28xx 3-1:0.0: dvb set to bulk mode. [ 292.973045][ T8456] em28xx 3-1:0.0: Registering snapshot button... [ 292.981255][ T8456] input: em28xx snapshot button as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/input/input7 15:50:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 293.077670][ T8807] usb 3-1: USB disconnect, device number 2 [ 293.085270][ T8807] em28xx 3-1:0.0: Disconnecting em28xx [ 293.110425][ T8456] em28xx 3-1:0.0: Remote control support is not available for this card. [ 293.204911][ T8807] em28xx 3-1:0.0: Closing input extension [ 293.212733][ T8807] em28xx 3-1:0.0: Deregistering snapshot button [ 293.310497][ T8807] em28xx 3-1:0.0: Freeing device 15:50:33 executing program 1: r0 = fsopen(&(0x7f0000000280)='gfs2\x00', 0x0) fsmount(r0, 0x0, 0x66) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2007ffe) sendfile(r1, r2, 0x0, 0x220fff) openat$dlm_plock(0xffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80200, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x41c001, 0x48) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x2007ffe) sendfile(r3, r4, 0x0, 0x220fff) [ 293.568502][ T9519] device vlan2 entered promiscuous mode [ 293.574181][ T9519] device wlan1 entered promiscuous mode [ 293.621601][ T9519] device wlan1 left promiscuous mode [ 293.784732][ T8807] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 294.045253][ T8807] usb 3-1: Using ep0 maxpacket: 8 [ 294.179555][ T8807] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 294.189867][ T8807] usb 3-1: New USB device found, idVendor=0ccd, idProduct=10af, bcdDevice=9b.ae [ 294.200331][ T8807] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 15:50:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 294.323701][ T8807] usb 3-1: config 0 descriptor?? [ 294.379404][ T8807] em28xx 3-1:0.0: New device @ 480 Mbps (0ccd:10af, interface 0, class 0) [ 294.388496][ T8807] em28xx 3-1:0.0: DVB interface 0 found: bulk [ 294.655139][ T8807] em28xx 3-1:0.0: unknown em28xx chip ID (0) 15:50:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/16, 0x10}, {&(0x7f0000000380)=""/87, 0x57}], 0x2, &(0x7f0000000400)=""/93, 0x5d}, 0x2060) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000500)=@security={'security\x00', 0xe, 0x4, 0x38c, 0xffffffff, 0x0, 0x0, 0x134, 0xffffffff, 0xffffffff, 0x2f8, 0x2f8, 0x2f8, 0xffffffff, 0x4, &(0x7f00000004c0), {[{{@ip={@empty, @private=0xa010100, 0xffffff, 0xff000000, 'veth0_to_hsr\x00', 'ipvlan1\x00', {0xff}, {0xff}, 0x29, 0x3, 0x62}, 0x0, 0xec, 0x134, 0x0, {}, [@common=@osf={{0x50, 'osf\x00'}, {'syz1\x00', 0x0, 0xd, 0x1}}, @common=@addrtype={{0x2c, 'addrtype\x00'}, {0x206, 0x183, 0x1, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, 'bridge_slave_1\x00', {0xfc5}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2b}, @rand_addr=0x64010102, 0xff, 0xffffffff, 'hsr0\x00', 'team_slave_1\x00', {0xff}, {}, 0x8, 0x0, 0x82}, 0x0, 0x94, 0xf0, 0x0, {}, [@common=@ttl={{0x24, 'ttl\x00'}, {0x2, 0x81}}]}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x1, @empty, 0x8, 0x0, [0x30, 0xd, 0x3b, 0x33, 0x35, 0x1d, 0x3b, 0x38, 0x7, 0x33, 0x27, 0x3a, 0x3e, 0x12, 0x2a, 0x25], 0x1, 0x8b14, 0x9}}}, {{@ip={@multicast1, @multicast1, 0xffffffff, 0xff, 'ip6tnl0\x00', 'syz_tun\x00', {0xff}, {}, 0x62, 0x3, 0x2}, 0x0, 0xb0, 0xd4, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x4, [0x6, 0x6, 0x3, 0x1, 0x0, 0x4], 0x2, 0x2}}}]}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00', 0x0, {0x1}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3e8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x3f}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000200)={r2, @in={{0x2, 0x4e21, @local}}}, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@ipv6_delrule={0x6c, 0x21, 0x400, 0x70bd2c, 0x25dfdbfe, {0xa, 0x10, 0x10, 0x1, 0x5, 0x0, 0x0, 0x6, 0x10}, [@FRA_DST={0x14, 0x1, @remote}, @FRA_DST={0x14, 0x1, @private0}, @FRA_DST={0x14, 0x1, @ipv4={[], [], @loopback}}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x6c}}, 0x0) [ 294.824034][ T9535] device vlan2 entered promiscuous mode [ 294.829973][ T9535] device wlan1 entered promiscuous mode [ 294.845674][ T8807] em28xx 3-1:0.0: reading from i2c device at 0xa0 failed (error=-5) [ 294.856351][ T8807] em28xx 3-1:0.0: board has no eeprom [ 294.933758][ T9535] device wlan1 left promiscuous mode 15:50:34 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ipvlan0\x00', 0x0}) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x16, &(0x7f00000002c0)) ptrace(0x10, r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=@dellinkprop={0xb4, 0x6d, 0x10, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r0, 0x1, 0x1010}, [@IFLA_IFNAME={0x14, 0x3, 'macvlan0\x00'}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xc71a}, @IFLA_NET_NS_PID={0x8, 0x13, r1}, @IFLA_WEIGHT={0x8, 0xf, 0xffffffe0}, @IFLA_IFALIAS={0x14, 0x14, 'wlan1\x00'}, @IFLA_PORT_SELF={0x54, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "55eb3f0fb6a3b62d2f4df7e3c09d9f50"}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_VF={0x8, 0x1, 0x9}, @IFLA_PORT_PROFILE={0x6, 0x2, '-\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x38c7}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "7f544addc4c5666234b4d9e1d6729bcd"}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x100080c0}, 0x40001) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000001c0)={[0x7ff, 0x4]}, &(0x7f0000000200), &(0x7f0000000340)={r3, r4+60000000}, 0x8) syz_mount_image$jfs(&(0x7f0000002800)='jfs\x00', &(0x7f0000002840)='./file0\x00', 0x0, 0x0, &(0x7f0000003bc0), 0x0, &(0x7f0000003c80)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESHEX=0xee00]) [ 294.986328][ T8807] em28xx 3-1:0.0: Identified as Terratec Grabby (card=67) [ 294.993735][ T8807] em28xx 3-1:0.0: dvb set to bulk mode. [ 295.001397][ T8456] em28xx 3-1:0.0: Registering snapshot button... [ 295.009738][ T8456] input: em28xx snapshot button as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/input/input8 [ 295.095039][ T8807] usb 3-1: USB disconnect, device number 3 [ 295.102300][ T8807] em28xx 3-1:0.0: Disconnecting em28xx [ 295.115582][ T8456] em28xx 3-1:0.0: Remote control support is not available for this card. [ 295.169462][ T8807] em28xx 3-1:0.0: Closing input extension [ 295.175618][ T8807] em28xx 3-1:0.0: Deregistering snapshot button [ 295.243772][ T8807] em28xx 3-1:0.0: Freeing device 15:50:35 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f00000000c0)=""/126, &(0x7f0000000040)=0x7e) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0xfffffffffffffcb9, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}]}, 0x3c}}, 0x0) 15:50:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 295.609615][ T9562] Mount JFS Failure: -22 [ 295.614097][ T9562] jfs_mount failed w/return code = -22 [ 295.851508][ T9568] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 295.900281][ T9569] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 15:50:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 296.060060][ T9571] device vlan2 entered promiscuous mode [ 296.065849][ T9571] device wlan1 entered promiscuous mode [ 296.196657][ T9571] device wlan1 left promiscuous mode [ 296.372523][ T9575] Mount JFS Failure: -22 [ 296.377122][ T9575] jfs_mount failed w/return code = -22 15:50:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$dlm_plock(0xffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xc0000, 0x0) r3 = openat$cachefiles(0xffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2100, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) splice(r4, 0x0, r5, 0x0, 0x4ffe2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x10, &(0x7f0000000c80)=r3, 0x4) sendmsg$inet(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) close(r2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x312) recvmsg(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000d00)=""/197, 0xc5}], 0x1}, 0x0) r6 = socket$nl_rdma(0x10, 0x3, 0x14) getsockname(r6, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000100)=0x80) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000300)={@un=@abs={0x1, 0x0, 0x4e20}, {&(0x7f0000000200)=""/217, 0xe8}, &(0x7f0000000180), 0x3}, 0xa4) setsockopt$ax25_SO_BINDTODEVICE(r4, 0x101, 0x19, &(0x7f00000003c0)=@netrom={'nr', 0x0}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000140)=[@in6={0xa, 0x4e21, 0x81, @mcast1, 0xfffffc00}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e20, @multicast1}], 0x3c) [ 296.582372][ T9579] device vlan2 entered promiscuous mode [ 296.589031][ T9579] device wlan1 entered promiscuous mode [ 296.682729][ T9579] device wlan1 left promiscuous mode 15:50:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 297.478431][ T9594] device vlan2 entered promiscuous mode [ 297.484093][ T9594] device wlan1 entered promiscuous mode [ 297.587080][ T9594] device wlan1 left promiscuous mode 15:50:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 298.039814][ T9598] device vlan2 entered promiscuous mode [ 298.046454][ T9598] device wlan1 entered promiscuous mode [ 298.092871][ T9598] device wlan1 left promiscuous mode [ 298.410434][ T9607] device vlan2 entered promiscuous mode [ 298.416358][ T9607] device wlan1 entered promiscuous mode [ 298.463741][ T9607] device wlan1 left promiscuous mode 15:50:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 298.872699][ T9616] device vlan2 entered promiscuous mode [ 298.878474][ T9616] device wlan1 entered promiscuous mode 15:50:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 298.970963][ T9616] device wlan1 left promiscuous mode 15:50:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:38 executing program 3: r0 = openat$apparmor_task_exec(0xffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000040)='\xc3\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x1d, 0x3, &(0x7f00000000c0)=@raw=[@map, @call={0x85, 0x0, 0x0, 0x3c}], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x75, &(0x7f0000000140)=""/117, 0x41100, 0x8, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x7, 0x5, 0xe1}, 0x10, 0xffffffffffffffff}, 0x74) r3 = dup(r2) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x0, @local, 0x34}}}, 0x84) pread64(r2, &(0x7f0000000380)=""/127, 0x7f, 0x10001) r4 = openat$nvram(0xffffff9c, &(0x7f0000000400)='/dev/nvram\x00', 0x408000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={@map=r3, r2, 0x21, 0x1, r4}, 0x14) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0x3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000500)={'syztnl0\x00', &(0x7f0000000480)={'sit0\x00', r1, 0x4, 0x4, 0x8, 0x33d4b22f, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2={0xfc, 0x2, [], 0x1}, 0x20, 0x7800, 0x9437, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r4, 0x89f7, &(0x7f00000005c0)={'ip6_vti0\x00', &(0x7f0000000540)={'syztnl1\x00', r5, 0x29, 0x1, 0xe9, 0x3, 0x69, @remote, @mcast1, 0x40, 0x10, 0x5}}) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000640)='ethtool\x00', r3) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r4, 0x89f4, &(0x7f0000000700)={'ip6tnl0\x00', &(0x7f0000000680)={'syztnl1\x00', r5, 0x0, 0x0, 0x5, 0x1, 0x8, @dev={0xfe, 0x80, [], 0x30}, @private1={0xfc, 0x1, [], 0x1}, 0x10, 0x10, 0x270}}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6_vti0\x00', r1, 0x2f, 0x47, 0x20, 0xa1f6, 0x0, @loopback, @loopback, 0x10, 0x10, 0x8, 0x7}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000880)={'syztnl1\x00', &(0x7f0000000800)={'sit0\x00', r5, 0x4, 0x80, 0x1, 0x5, 0x40, @ipv4={[], [], @local}, @mcast2, 0x80, 0x8, 0xffffff7f, 0x8001}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000b40)={&(0x7f0000000600), 0xc, &(0x7f0000000b00)={&(0x7f00000008c0)={0x210, r7, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x210}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) r11 = signalfd(r2, &(0x7f0000000b80)={[0x3, 0x1]}, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000bc0)=@sack_info={0x0, 0x2, 0x20}, &(0x7f0000000c00)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r11, 0x84, 0x7b, &(0x7f0000000c40)={r12, 0x313}, &(0x7f0000000c80)=0x8) [ 299.432562][ T9621] device vlan2 entered promiscuous mode [ 299.438716][ T9621] device wlan1 entered promiscuous mode [ 299.775715][ T9621] device wlan1 left promiscuous mode [ 300.190220][ T9623] device vlan2 entered promiscuous mode [ 300.196282][ T9623] device wlan1 entered promiscuous mode [ 300.255588][ T9623] device wlan1 left promiscuous mode 15:50:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 300.656652][ T9640] device vlan2 entered promiscuous mode [ 300.662322][ T9640] device wlan1 entered promiscuous mode 15:50:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 300.736516][ T9640] device wlan1 left promiscuous mode 15:50:40 executing program 1: r0 = syz_usb_connect(0x2, 0x7d, &(0x7f0000000040)={{0x12, 0x1, 0x310, 0x1a, 0x7a, 0x46, 0x10, 0x12d1, 0x1d4e, 0xad92, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xc1, 0x2, 0x0, 0xff, 0x6, 0xa, 0x0, [@cdc_ncm={{0xb, 0x24, 0x6, 0x0, 0x1, "013fa72ccec2"}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0xfff, 0xf13e, 0xcc, 0x3f}, {0x6, 0x24, 0x1a, 0x81, 0x31}, [@mdlm={0x15, 0x24, 0x12, 0x2}, @mdlm={0x15, 0x24, 0x12, 0x8}, @acm={0x4, 0x24, 0x2, 0x5}, @mbim_extended={0x8, 0x24, 0x1c, 0x4, 0x0, 0x98}]}]}}]}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f0000000380)={0x18, &(0x7f00000000c0)={0x0, 0x22, 0x9d, {0x9d, 0x5, "3fd26e117b546e2d3d4f3107feb705c68b7f920f497a05a9515bdbf7ec9b6b50f25821cb670c72883a9553cc5eeb71c0f9e9eee20f9db6c287b07648351dc5a45a3789966015fa74a43e387de911bc5d2a2f65c20e611e478b336ef043542a70a3ab58defbfabe5d16db499f48c91095f43a04a089552fd79882c918994b2f9f1ff2f1e8de77053f7d523e19f8a0c445446584084b4e8c610972ce"}}, &(0x7f0000000180)={0x0, 0x3, 0x9e, @string={0x9e, 0x3, "63d7bc04e4366f9688b783d389b273e78090241a9a49ab11a62c0f9fc706d032d508d2bebfe9514c2975b94f1a6b104eb696ca9bcef20b1a5e7c1986b2077f64eb0f7eff95ce8e0ddc62c0a8247cbbfe5f5fedb003d6623235438745552a3b03de7fab75bda00973f422f45122e53685b6df34702ae9430c20d668f8e1b7cec23255ce7e8f4f2cee751fdc68862875d71ad1371f5c4ced2c593000d4"}}, &(0x7f0000000240)={0x0, 0xf, 0xcc, {0x5, 0xf, 0xcc, 0x5, [@ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x7, 0x9, 0x2}, @generic={0x36, 0x10, 0x2, "ca7af654082075f5505164540f90ec84fd0c2e4d6caeb3b596c9a3e8db07f53828ec6b7fd8a5a6f23e9b765d84c3fd97043660"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x0, 0xa7, 0xff72}, @generic={0x7d, 0x10, 0xa, "c615a4661eacf71121abfd2d8fbcd9920a2ace84abdbcf05285eea5f9546e7811e6eaa44bc10e71bc3bf95eb65d11d6c2e5de54698d2038e104b50b3dd38bb58eafa57732e75e94bb5632f869aebf2d4a81d27d8447fd135f333cad4605371c34b2612cf2ee8d0450450b96d4466a583274912b19978bbeb9c84"}]}}, &(0x7f0000000000)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3f, 0x1, 0x3, 0x1, "7c75910e", "eeec96f0"}}, &(0x7f0000000340)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x2, 0x18, 0x1, 0x8, 0xfb, 0x1000, 0xff}}}, &(0x7f0000000800)={0x44, &(0x7f00000003c0)={0x0, 0x17, 0x68, "66eb278a586d217abf1eb4aca901f73f328daff6985dc20ab879460cdcf275be833a03a7d706fa85175cb2aec87e94d4c9bd4c12ee39a586de84072eeeca165b9eddd2cbb52dbc4e849094eac39779bf5cf984fc13adfcb11b4d586678e200598c2be7a277f69248"}, &(0x7f0000000440)={0x0, 0xa, 0x1, 0x81}, &(0x7f0000000480)={0x0, 0x8, 0x1, 0x3}, &(0x7f00000004c0)={0x20, 0x0, 0x4}, &(0x7f0000000500)={0x20, 0x0, 0x4, {0x0, 0x20}}, &(0x7f0000000540)={0x40, 0x7, 0x2, 0x4}, &(0x7f0000000580)={0x40, 0x9, 0x1, 0xce}, &(0x7f00000005c0)={0x40, 0xb, 0x2, "95cb"}, &(0x7f0000000600)={0x40, 0xf, 0x2, 0xfc00}, &(0x7f0000000640)={0x40, 0x13, 0x6, @local}, &(0x7f0000000680)={0x40, 0x17, 0x6, @local}, &(0x7f00000006c0)={0x40, 0x19, 0x2, "1ed6"}, &(0x7f0000000700)={0x40, 0x1a, 0x2, 0x7fff}, &(0x7f0000000740)={0x40, 0x1c, 0x1}, &(0x7f0000000780)={0x40, 0x1e, 0x1, 0x4e}, &(0x7f00000007c0)={0x40, 0x21, 0x1, 0x3}}) syz_usb_control_io$hid(r0, 0x0, 0x0) [ 301.185608][ T9646] device vlan2 entered promiscuous mode [ 301.191871][ T9646] device wlan1 entered promiscuous mode [ 301.266602][ T9646] device wlan1 left promiscuous mode [ 301.564726][ T8807] usb 2-1: new full-speed USB device number 11 using dummy_hcd 15:50:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 301.938664][ T8807] usb 2-1: unable to get BOS descriptor or descriptor too short [ 302.064939][ T9660] device vlan2 entered promiscuous mode [ 302.070618][ T9660] device wlan1 entered promiscuous mode [ 302.080733][ T8807] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 302.088957][ T8807] usb 2-1: can't read configurations, error -71 [ 302.161899][ T9660] device wlan1 left promiscuous mode [ 302.483984][ T9664] device vlan2 entered promiscuous mode [ 302.489873][ T9664] device wlan1 entered promiscuous mode [ 302.507245][ T9664] device wlan1 left promiscuous mode [ 302.795862][ T8807] usb 2-1: new full-speed USB device number 12 using dummy_hcd [ 303.094288][ T9656] IPVS: ftp: loaded support on port[0] = 21 [ 303.214927][ T8807] usb 2-1: unable to get BOS descriptor or descriptor too short [ 303.368103][ T8807] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 303.375945][ T8807] usb 2-1: can't read configurations, error -71 15:50:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 303.525166][ T8807] usb usb2-port1: attempt power cycle [ 303.988331][ T9706] device vlan2 entered promiscuous mode [ 303.994001][ T9706] device wlan1 entered promiscuous mode [ 304.081854][ T9706] device wlan1 left promiscuous mode [ 304.593291][ T9715] device vlan2 entered promiscuous mode [ 304.599182][ T9715] device wlan1 entered promiscuous mode [ 304.670181][ T9715] device wlan1 left promiscuous mode [ 304.894590][ T5] Bluetooth: hci3: command 0x0409 tx timeout [ 305.062435][ T9716] device vlan2 entered promiscuous mode [ 305.069474][ T9716] device wlan1 entered promiscuous mode [ 305.150248][ T9716] device wlan1 left promiscuous mode 15:50:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 305.484904][ T9656] chnl_net:caif_netlink_parms(): no params data found 15:50:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 306.002248][ T9834] device vlan2 entered promiscuous mode [ 306.008208][ T9834] device wlan1 entered promiscuous mode [ 306.048080][ T9834] device wlan1 left promiscuous mode [ 306.324468][ T9835] device vlan2 entered promiscuous mode [ 306.330155][ T9835] device wlan1 entered promiscuous mode [ 306.348327][ T9835] device wlan1 left promiscuous mode [ 306.700747][ T9838] device vlan2 entered promiscuous mode [ 306.707500][ T9838] device wlan1 entered promiscuous mode [ 306.737862][ T9838] device wlan1 left promiscuous mode [ 306.993527][ T7] Bluetooth: hci3: command 0x041b tx timeout [ 307.030307][ T9656] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.039361][ T9656] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.049088][ T9656] device bridge_slave_0 entered promiscuous mode [ 307.117200][ T9656] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.125349][ T9656] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.136586][ T9656] device bridge_slave_1 entered promiscuous mode [ 307.405963][ T9656] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 307.454074][ T9656] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 307.548149][ T9656] team0: Port device team_slave_0 added [ 307.563971][ T9656] team0: Port device team_slave_1 added [ 307.630594][ T9656] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 307.638274][ T9656] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.666462][ T9656] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 307.693338][ T9656] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 307.700731][ T9656] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 307.727104][ T9656] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 307.808049][ T9656] device hsr_slave_0 entered promiscuous mode [ 307.847299][ T9656] device hsr_slave_1 entered promiscuous mode [ 307.878458][ T9656] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 307.890542][ T9656] Cannot create hsr debugfs directory [ 308.460919][ T9656] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 308.499033][ T9656] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 308.531903][ T9656] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 308.560161][ T9656] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 308.895851][ T9656] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.933217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.943377][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.967715][ T9656] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.996779][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.008159][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.017815][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.025454][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.083887][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.093607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.103707][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.113822][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.121555][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.131031][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.142181][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.246933][ T9656] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 309.257685][ T9656] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 309.293374][ T7] Bluetooth: hci3: command 0x040f tx timeout [ 309.312949][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.323850][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.334602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.345194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.355930][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.365807][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.376392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.386167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.441203][ T9656] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.506171][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.518398][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.527461][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 309.535457][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 309.543451][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.554206][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.641877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.651942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.669809][ T9656] device veth0_vlan entered promiscuous mode [ 309.686038][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.696124][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.731154][ T9656] device veth1_vlan entered promiscuous mode [ 309.885688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 309.895401][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 309.906265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.916513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.943848][ T9656] device veth0_macvtap entered promiscuous mode [ 309.970798][ T9656] device veth1_macvtap entered promiscuous mode [ 310.053842][ T9656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 310.064714][ T9656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.075504][ T9656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 310.087842][ T9656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.098012][ T9656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 310.108791][ T9656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.122979][ T9656] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 310.136091][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 310.146090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 310.155969][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.166207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.213103][ T9656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 310.227042][ T9656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.237221][ T9656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 310.248066][ T9656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.258236][ T9656] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 310.269018][ T9656] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 310.283222][ T9656] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 310.291519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.301970][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.346567][ T9656] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.355592][ T9656] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.364692][ T9656] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.373591][ T9656] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.793871][ T670] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.802607][ T670] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 310.812023][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 310.977533][ T670] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 310.985683][ T670] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 311.005620][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 311.375751][ T7] Bluetooth: hci3: command 0x0419 tx timeout 15:50:51 executing program 3: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1145042, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', &(0x7f0000000700)=""/4096, 0x1000) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000400000084f072214300020095000000a0209d5e"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='ext4_direct_IO_exit\x00', r3}, 0x10) ftruncate(r2, 0x208202) sendfile(r0, r1, 0x0, 0x8000fffffffa) 15:50:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 311.644223][ T9964] device vlan2 entered promiscuous mode [ 311.650042][ T9964] device wlan1 entered promiscuous mode [ 311.692633][ T9964] device wlan1 left promiscuous mode [ 311.922031][ T33] audit: type=1800 audit(1616341851.506:2): pid=9971 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14000 res=0 errno=0 [ 311.994677][ T9968] device vlan2 entered promiscuous mode [ 312.000360][ T9968] device wlan1 entered promiscuous mode [ 312.040603][ T9968] device wlan1 left promiscuous mode [ 312.475848][ T33] audit: type=1800 audit(1616341852.066:3): pid=9976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=14000 res=0 errno=0 [ 312.546485][ T9969] device vlan2 entered promiscuous mode [ 312.553287][ T9969] device wlan1 entered promiscuous mode [ 312.569412][ T9969] device wlan1 left promiscuous mode 15:50:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) write$binfmt_misc(r0, 0x0, 0xfdf3) 15:50:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x2, 0x6, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000774c0000000000000000000085100000010000009500000000000000850000001b0000009500000000000000b3003e19eda3a8742e3a169b81b9e4df3f0e7c27c609bf74bee02deddf0a8ee86ed69e6104edb6830cf53550ac617ef11e79260acb9cd5a7d7a3be14643a001f64a7d06830ed81ebb767f37f82238aff1b76324a6b0000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 15:50:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mremap(&(0x7f00003ad000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mmap(&(0x7f000005d000/0x400000)=nil, 0x402c04, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) mbind(&(0x7f00004aa000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000000)=0x7, 0x5, 0x4) socket$inet(0x2, 0x800, 0x7ff) [ 313.519845][ T9993] device vlan2 entered promiscuous mode [ 313.525707][ T9993] device wlan1 entered promiscuous mode 15:50:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000dc0)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000002c0)={0x40, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_FRAME={0x24, 0x33, @probe_request={@with_ht={{{}, {}, @broadcast, @device_b}, @ver_80211n={0x0, 0x7fc0}}, @val, @val, @void, @void, @void}}]}, 0x40}}, 0x0) [ 313.614939][ T9993] device wlan1 left promiscuous mode [ 314.003051][ T9996] device vlan2 entered promiscuous mode [ 314.008833][ T9996] device wlan1 entered promiscuous mode 15:50:53 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd6000000000142f00fc000000000000000000000000000000fe8000000000000000000000000000aa0000883e", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000009078f500"], 0x0) [ 314.073224][ T9996] device wlan1 left promiscuous mode 15:50:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x340, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "ba12245cb9c32de9", "d4c457b38f96fbbfca286c514addcae8", "8d9562d8", "8947b23bc84b4e69"}, 0x28) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0xffe1, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, 0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x1f00, 0x109, 0x1f, 0xfffffffc, r2}, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x401}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9dd}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000044}, 0x1) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00010000000086dd607f0000000000000000000000000000ffff8000000000000000000000000000aa00004e2200000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000002047c00"], 0x0) 15:50:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:54 executing program 1: r0 = syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000cfc6ae084c052b000b01000000010937c9fb80a923f0022400010000000009040000139ac302ca7a08112dce40df3bdec663c71f25730009050e0200000000"], 0x0) r1 = syz_usb_connect(0x6, 0x64e, &(0x7f0000000ec0)={{0x12, 0x1, 0x310, 0xe7, 0x8e, 0xc2, 0x28, 0xe8d, 0x33, 0x25b1, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x63c, 0x2, 0x8, 0x5, 0x10, 0x8, [{{0x9, 0x4, 0x1c, 0xdd, 0x9, 0xa, 0x0, 0x0, 0xc1, [@uac_as={[@format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x5, 0x4, 0x7, 0x8, 'G)', "73ec"}, @format_type_i_continuous={0xc, 0x24, 0x2, 0x1, 0x10, 0x3, 0x1, 0x5, "88", "6f872e"}, @format_type_ii_discrete={0xe, 0x24, 0x2, 0x2, 0x6, 0x9, 0x9, "34f06f4eaa"}]}], [{{0x9, 0x5, 0x3, 0xc, 0x400, 0x8b, 0x5, 0x7}}, {{0x9, 0x5, 0x4, 0x0, 0x10, 0x2, 0x4, 0x9}}, {{0x9, 0x5, 0xa, 0x10, 0x3ff, 0x2, 0x6, 0x40, [@generic={0x86, 0xd, "3b496a6eb82ba9f8c4f8c6ab065868f13492567aa43ab31ef33048ed237478bb934d9891d3d88fbdcbc4796d74bdc4cc79f80df91e23003dfc9c32e0ae6cefd84aa61225eb5ab10629423afbb200577ac8d6f39addcdad68d0734c2dd5fbfa325db9c119e1278a2160b2da7cf6c20da803759ac67b8eb71ff37e7f174492d53b5ace7f5e"}, @generic={0xae, 0x8, "2799cc0bfadabb154fcee3319578efabd8cfa4af38fe4b50ad29c0f423fa8540b4a2ea48a8957ecee1161d772204279956b8abf1f255811daf2310b01394909972d1389a36738ba133a3f7cc7d030743a8f3c4b55dd622bb8d46a292d47b80be5c7490f372f50fb975a2d5e2d405141bc8c315f2f2c8a9a039ae4c876ec0cc148a0c12e5c9f86f56890aa189925cc3b9b51ce846be5000caa278dbbb8dbad1795de081fec5731c66b2dcd399"}]}}, {{0x9, 0x5, 0x9, 0x2, 0x400, 0x6, 0x20, 0x83, [@generic={0xf9, 0x7, "c415e045b52ae7c1a8dd1e5ca3f824ec37aaffe1afaae6c2c6d5261e6d81effc0643b6e6d3c71c67a0ec082affe9f8b7d06235b4a55d6e0aca38c1bf98eb18ee5372c18d3b27af312b6913f44d6f0d6f4f86a890ecb77e007cbce4ae81ab6623090bd36c2ff2085d46c4a8ae9b85e0afb93356c6140c5270601506a1ed6ecab06de6a1b8a5c7edf3bac4ce8b2df850624be4500f429042808180b74d0ce23b1c783ba6e57e07202f2f04c58e48efeef0947bf3592c88a3fae41b356c588ec111d73a090dc270137bb188bef5777e78aaa35f7c762f973462e1ba85cf9e23a0e427a5ef03509282d5f9fbb732d64eda7a00b18f41af1910"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x1, 0x1ff}]}}, {{0x9, 0x5, 0x9, 0x3, 0x20, 0x7, 0x81, 0x3, [@generic={0x42, 0x9, "8e8a4f93932b46bb75fe51b004f6c759643c1ee9d96cd9d10177745a9f000e74340c72bd71984292b729665b6b09d517019fb641c9496a3fcc0847c1711342a0"}, @generic={0x15, 0xf, "277fa69ae8beaa2851c544c0f32d5b1b0a88b3"}]}}, {{0x9, 0x5, 0x8, 0x0, 0x40, 0x50, 0x8, 0x3f, [@generic={0xd3, 0x2, "5136a47b05f802afcc84c40eb975c794259752342b5ee5019adfe2eafd11084f99540e79accede29c75c484bc5aa416567e0f8b590019d6a432e077a8238037639c6365d3a442b12b394571cb4a878f36765aaff0fd3fa9a63cc6dc95b307a5d66984b430071491a693ab933f8dcb092d7634cec3b5e2d9c80fa6a845636fd61ca989370aa9f68609a6fa5f4a0a944915ad4bb832453beb4fce42efb306e2a69d254516a489172216c19ecbb467f8a61cb8e530086b1082c9707a7976e1b8552cb7df41ffc593aee35a1eacce9f76c58d6"}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x3, 0x100}]}}, {{0x9, 0x5, 0x1, 0x2, 0x10, 0x11, 0x40, 0x3f, [@generic={0x2a, 0x23, "583b6ccdf3892987a368d2d58f987be967cff26c5cfae3c6e4c5b0541339b1111d5bc0f969151b9a"}]}}, {{0x9, 0x5, 0x5, 0x10, 0x10, 0xa8, 0x87, 0xfe, [@generic={0x34, 0x22, "af9923976a6f8e58c3e88af747602287b81e584ab381b059ff0a2c4174c341ba4cc30d89ec0be2b2dda546235ae7fb86cd31"}]}}, {{0x9, 0x5, 0xf, 0xc, 0x3bf, 0xff, 0xfc}}]}}, {{0x9, 0x4, 0x2e, 0x9, 0x8, 0x91, 0xfd, 0x72, 0x42, [], [{{0x9, 0x5, 0x4, 0x3, 0x40, 0x0, 0x6, 0x8}}, {{0x9, 0x5, 0xb, 0x3, 0x3ff, 0x7f, 0x4, 0x40}}, {{0x9, 0x5, 0x7, 0x10, 0x40, 0xff, 0x0, 0x7f, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x3, 0x3}]}}, {{0x9, 0x5, 0x2, 0x0, 0x8, 0x8, 0xe0, 0x5}}, {{0x9, 0x5, 0x1, 0x3, 0x3cf, 0x5, 0x4, 0x97}}, {{0x9, 0x5, 0x2, 0x10, 0x20, 0x2, 0x40, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x4, 0x1f}, @generic={0x94, 0x0, "b19505649dc6f2eeb73eeed29299881f73715101ccdb9a4d93608ec868484357a5a3c8b64350b449efb9d5fbebf100b993dc0d1b74aac6d5a12fd97bb8e8b918d9962d0e7eb2ee11b7d3427daff5cfc3b6eb1d9daaa1e972243c24afee1695a2efba85a71bc527c94d92b231c4c6729918df81f79b05ddc571a506a452544a90ce620d1bc9d7b9af9367ce5c0b9d21e565c3"}]}}, {{0x9, 0x5, 0x6, 0x1, 0xf0393e595067a1e0, 0xff, 0xfa, 0x20}}, {{0x9, 0x5, 0xd, 0xc, 0x400, 0x0, 0x42, 0x3, [@generic={0xfd, 0x40f03bb22fee0283, "a793568f86984bdb7cdff98d375dfcaa5e90a5e0b179d648cd813b066ee9afe7a526a1e944f4c23fe8b6d482d38ba26c9be2fcec09083a9680e238099920fdacfee979a7d59638861349e21f7e9d93768f1c559a576e18b4732af6354be9ec102a4b3b17217d824e0330497c9c21cf3009a2b81168962d4b2b9eb4ba71c52ba43cefce99f21998055d1f26ac7dfdc53f1c84b82989577fb7e78e9cebab9251052fb87fd4b0ea3488def1ee0cc4ae371dc8627b4318a26a38176e2bc0f8b2c5d96d65231fbcc559e33ee0eb96e982c00d5294f4782229dd68113a006c863bc5bf72b991aa3292296a165c6da782c8627643aeff8fec5d69e4fb102f"}]}}]}}]}}]}}, &(0x7f0000001600)={0xa, &(0x7f0000000b00)={0xa, 0x6, 0x310, 0x9, 0x8, 0x1, 0xff, 0x22}, 0xf6, &(0x7f0000000b40)={0x5, 0xf, 0xf6, 0x6, [@generic={0xb1, 0x10, 0x3, "03c190f98ccf64c975bf7eddf50fabc4c13a7d052c4e569167628edff1701351f947fdfce562d865e6e51220b0fe9f764efb74573180aa13561f3789ed4b49381e19778ddc609ca5f23abdaff946129db495a6822b714f4abfd662f2972ba60c87c5ab328e7c9297fd7fc9a0da6a1818b751bfc8fa3f343fb461d5a1ba78a839a9acd625899884ca19df23e2e39d04ab1c945a52f13048c1ee063077c77f1df6623a744eb30296d6b3862d62f6c4"}, @ssp_cap={0x20, 0x10, 0xa, 0x0, 0x5, 0x8, 0xe11e, 0x5, [0x180ff, 0xfe403f, 0xe808c1f7d5729a8, 0xf, 0x60]}, @wireless={0xb, 0x10, 0x1, 0x8, 0x63, 0x0, 0xfe, 0xfbff}, @ext_cap={0x7, 0x10, 0x2, 0x1e, 0x8, 0x7, 0x3f}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x5, 0xd, 0x3}, @ext_cap={0x7, 0x10, 0x2, 0x87bfa37275c42262, 0x6, 0x6, 0x8d}]}, 0x6, [{0x4, &(0x7f0000000c40)=@lang_id={0x4, 0x3, 0x1004}}, {0x4, &(0x7f0000000c80)=@lang_id={0x4, 0x3, 0x418}}, {0x23, &(0x7f0000000cc0)=@string={0x23, 0x3, "95180f10fb40d26dd9ae13d378c649e6aeee42881c89ff829a9fd64d4234864365"}}, {0x8c, &(0x7f0000000d00)=@string={0x8c, 0x3, "34e1cbbc39fb60962bcacf4c3846ffc9c72b594cd74373dcc5fffa800e46422ddb7b7fa979cbeb69cb549a3ab9b3e4a8594f15ed71c678cdec8d5cfbb1f1315ced3613a6bf06829514a83a18da4cd6cf2dc68901420a555aecc8ac82d8d67c75f61939dbf1aa61a7e1cb6d86e6c2abe8277fa0fbf7c4a65b1e704ddadd4f4a4fe651ff6424754c8e317a"}}, {0x82, &(0x7f0000001540)=@string={0x82, 0x3, "dae430a77a582eaf719c683dbbf45723f45875baf5e24bf99c75d1ef62ccc3a1bd312154d682f747b1a6575ca6546cfb2738b39e03cb9f60295f4b362eaee22eb9d73af278075ba998097297396302e8cc0bf840f1ab90e90c42980da2a0d4bb2dcf4e0071ac939c19a1b4ffc7a59348e5833eb6d9533723e4eeffeb9fba64e5"}}, {0x4, &(0x7f0000000dc0)=@lang_id={0x4, 0x3, 0x402}}]}) syz_usb_control_io$cdc_ncm(r1, &(0x7f0000001700)={0xc, &(0x7f0000001680)={0x20, 0x24, 0x51, {0x51, 0x7, "5d00f84d5f900dcbd68bcbd8a60d79d0dea01e03b328948158164721399dab60cf386ae9e91dc7dfae6bfc93fdb8a51aaf4562ef314d1a2d6b227317090aa982064d24214da362f88c260abffda869"}}, &(0x7f0000000e00)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000001a00)={0x24, &(0x7f0000001740)={0x20, 0x16, 0xf4, "e58e3d84434646c9ba690ccc22827335458a220c9669b9050453823af71f10a8e2764a91fb892f0ebdd1894c12e71b991012649a6586b861fc37ac9679b03dffa53ab700d1a53ddaed7fc55b8f3a8efd881e62a99b020229ffa5b3df522f0f316e73295c68144ae7536b884561207aa940eb12a73d88f5d6d1b96f4e759a7bd874b33602f4aa23d0e48fb455e660bf0d49e18781bf294bc716793bbcb4ac274362e32ea2548ae1523a5d2c01de898cfeba8c2529d6c642340e7e4f53f314ca5a40ad4f1e21d4a44619384b90e9037c02045ae55c2fcf96b3b969ff25ae35c3bf57047c5e232228ee2cce2973ae4f4f9289b3234e"}, &(0x7f0000001840)={0x0, 0xa, 0x1}, &(0x7f0000001880)={0x0, 0x8, 0x1, 0x40}, &(0x7f00000018c0)={0x20, 0x80, 0x1c, {0x8, 0xbd7, 0x100, 0x8, 0x2, 0x9, 0x614, 0x3, 0xf00, 0x9, 0x9, 0x5}}, &(0x7f0000001900)={0x20, 0x85, 0x4, 0x13}, &(0x7f0000001940)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000001980)={0x20, 0x87, 0x2, 0x5a64}, &(0x7f00000019c0)={0x20, 0x89, 0x2, 0x1}}) r2 = syz_usb_connect$cdc_ecm(0x1, 0x6b, &(0x7f0000000000)={{0x12, 0x1, 0x41, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x59, 0x1, 0x1, 0x0, 0xe0, 0x80, [{{0x9, 0x4, 0x0, 0x1, 0x3, 0x2, 0x6, 0x0, 0x6, {{0xa, 0x24, 0x6, 0x0, 0x0, "80074d043a"}, {0x5, 0x24, 0x0, 0x2}, {0xd, 0x24, 0xf, 0x1, 0xffff42d3, 0x1, 0x81, 0x5}, [@ncm={0x6, 0x24, 0x1a, 0x202, 0x1b}, @obex={0x5}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0x2}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x10, 0x1, 0xf7, 0x9}}], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x4c, 0x8, 0x1f}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0x7, 0x4, 0x15}}}}}]}}]}}, &(0x7f00000002c0)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x250, 0x2, 0x4, 0xfb, 0x20, 0x8}, 0x23, &(0x7f0000000140)={0x5, 0xf, 0x23, 0x3, [@ssp_cap={0x10, 0x10, 0xa, 0x6, 0x1, 0x517a, 0x1ef00, 0x5, [0x0]}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x0, 0xc, 0x8, 0x80, 0xfffa, 0x4}]}, 0x3, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x3001}}, {0x7d, &(0x7f00000001c0)=@string={0x7d, 0x3, "1041a5b60190cf240240f17cbe5a4879ed06551128e498eef0f06fc4f84f110c3c87c15d4b5e5c95c16b27b5201ceda6631d38621cc8e8e48214ff70824df8630c13c17d1918e2f780974a115b5c9aa180556c81889b20ac1883f42b1f8c83b9cb3c9b922cde89f3dfdd93e2f5f523542a696a5f0c2ca4d104dcb9"}}, {0x5a, &(0x7f0000000240)=@string={0x5a, 0x3, "485fec882d7ed9b5e6014a797b0979b29971b8448375e91a5df45fc2815e04ff5fbb81ea0180e685d4dc35e1573d331888d95b02cd2948cbf1cc8a55244c801e9f8793b99eebc1508e1565ad2af524262288a5f67a788c55"}}]}) syz_usb_control_io(r2, &(0x7f0000000580)={0x18, &(0x7f0000000300)={0x0, 0x31, 0x75, {0x75, 0x23, "bd47cdb732ec750f24789fa3793d122f87c01b02c4a94a8270a5b07d92184ba71919f8db092f1da3e30a52dc9924908dc8d8ca447702c80cb51025dc51180d9e473c43fad24891a9bd1844673658d769c07edb92754d0aa60a91e617021b70606a93a9761ccba9cd15958b9aa0285f9263aa9f"}}, &(0x7f0000000380)={0x0, 0x3, 0xfa, @string={0xfa, 0x3, "d3e04cac8ac843fe12db66d2b459bfd8261d3b36b5bfa054749237cd17c8521a03330118f3ba2788e4a960942717007e6e7b630ac20cfab29f98b0a5f4ef89c859e5956ccaff87274c09dcf421802f877274d0f7dc44d04214ba8c516f99eee03858f215f0c712a964860b6bd0feaba0d44f9f0f0775f8f59223027e311d24b1b627b6c55aaab25a0232def4fd3616fc40c623afd3ed57e9850f562c3956f2ce0b5d567e97d30f8a3df8796edd27b6456f36094b62eab45c32781f0d50ec7f5e0dcdec60dac4270904227688f811132bc21cc342427743a10501463dc5e2e548b8c59d27e459c76b5dd082efd79d3ebead315d110ba0f94d"}}, &(0x7f0000000480)={0x0, 0xf, 0x6f, {0x5, 0xf, 0x6f, 0x5, [@ext_cap={0x7, 0x10, 0x2, 0x8, 0x7, 0x4, 0x8}, @wireless={0xb, 0x10, 0x1, 0x8, 0x40, 0x7, 0x6, 0xbc0b, 0xc9}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x40, 0x3}, @wireless={0xb, 0x10, 0x1, 0xc, 0x24, 0x4, 0x8, 0x7, 0x9}, @generic={0x43, 0x10, 0x3, "29798936a05a80f1016e44bc733775a0999ad184ab251d2c105f02919a76e83896e3c59b00e5b545951d9d972f883c241c16d74e2208edf85c0a5c98010297c5"}]}}, &(0x7f0000000500)={0x20, 0x29, 0xf, {0xf, 0x29, 0x80, 0x10, 0x4, 0x5, "a2d09466", "97392058"}}, &(0x7f0000000540)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x7, 0x18, 0x5, 0x7, 0x1f, 0x7f, 0x1}}}, &(0x7f0000000a80)={0x44, &(0x7f00000005c0)={0x20, 0x7, 0xe9, "43ee1631f01baaae93a4220fa8fa28fe8e329d225429ee08cf5318e93625bb6236792315ff35d49f3a1dad6ba11020efabeafeb83088c5a7082abfd33fff7246aeeb009c23b465cb01ec1d2425abeb4a0534b288e1a4f431f011d889724f8cd32a4d9c096d2b14af599d36fdbd0eeaa94f85235088f612bc42c6a2f68257d79aa4dd93f8ac5532919a1ee9b163c03df97f2f3d4fabad44781a3cf6b31aa56fab0bb4bd7844b5f75a4fa9ef07c9771c5d7409ec3ee91b965de216c769ffad379af0a6cfcc94a905a8cd83d7ccc4d7f81d1ea12946c6fcfdd2c644be6331ad36601e50dd420cf208170f"}, &(0x7f00000006c0)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0x9}, &(0x7f0000000740)={0x20, 0x0, 0x4, {0x3, 0x1}}, &(0x7f0000000780)={0x20, 0x0, 0x4, {0x2, 0x4}}, &(0x7f00000007c0)={0x40, 0x7, 0x2, 0x672}, &(0x7f0000000800)={0x40, 0x9, 0x1, 0x2}, &(0x7f0000000840)={0x40, 0xb, 0x2, 'nt'}, 0x0, &(0x7f0000000880)={0x40, 0x13, 0x6}, &(0x7f00000008c0)={0x40, 0x17, 0x6, @local}, &(0x7f0000000900)={0x40, 0x19, 0x2, "09e0"}, &(0x7f0000000940)={0x40, 0x1a, 0x2, 0x200}, &(0x7f0000000980)={0x40, 0x1c, 0x1, 0x8}, &(0x7f00000009c0)={0x40, 0x1e, 0x1, 0x9f}, &(0x7f0000000a40)={0x40, 0x21, 0x1, 0x46}}) syz_usb_control_io(r0, 0x0, &(0x7f0000000e40)={0x44, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 315.108321][T10023] device vlan2 entered promiscuous mode [ 315.116453][T10023] device wlan1 entered promiscuous mode [ 315.228747][T10023] device wlan1 left promiscuous mode 15:50:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x340, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "ba12245cb9c32de9", "d4c457b38f96fbbfca286c514addcae8", "8d9562d8", "8947b23bc84b4e69"}, 0x28) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={0x0, 0xffe1, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r2, 0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x1f00, 0x109, 0x1f, 0xfffffffc, r2}, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x401}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8000}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9dd}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000044}, 0x1) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00010000000086dd607f0000000000000000000000000000ffff8000000000000000000000000000aa00004e2200000000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200009078000002047c00"], 0x0) [ 315.485026][ T4672] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 315.725106][ T4672] usb 2-1: Using ep0 maxpacket: 8 [ 315.727733][T10030] device vlan2 entered promiscuous mode [ 315.739747][T10030] device wlan1 entered promiscuous mode [ 315.781408][T10030] device wlan1 left promiscuous mode [ 315.906427][ T4672] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 315.914566][ T4672] usb 2-1: can't read configurations, error -61 15:50:55 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000240)=ANY=[@ANYBLOB="1201000030dd2406000c130070f701020301090212000100e45079e1b8f9f1d224731e00"], 0x0) [ 316.125127][ T4672] usb 2-1: new high-speed USB device number 15 using dummy_hcd 15:50:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 316.384713][ T4672] usb 2-1: Using ep0 maxpacket: 8 15:50:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 316.564648][ T4672] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 316.572428][ T4672] usb 2-1: can't read configurations, error -61 [ 316.623404][ T4672] usb usb2-port1: attempt power cycle [ 316.794852][ T1990] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 316.821776][T10050] device vlan2 entered promiscuous mode [ 316.827744][T10050] device wlan1 entered promiscuous mode [ 316.889475][T10050] device wlan1 left promiscuous mode [ 317.005291][ T1990] usb 4-1: device descriptor read/64, error 18 [ 317.259245][T10051] device vlan2 entered promiscuous mode [ 317.265302][T10051] device wlan1 entered promiscuous mode [ 317.275990][ T1990] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 317.292922][T10051] device wlan1 left promiscuous mode [ 317.365635][ T4672] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 317.474584][ T1990] usb 4-1: device descriptor read/64, error 18 [ 317.495685][ T4672] usb 2-1: Using ep0 maxpacket: 8 [ 317.595352][ T1990] usb usb4-port1: attempt power cycle [ 317.676378][ T4672] usb 2-1: unable to read config index 0 descriptor/start: -61 [ 317.685930][ T4672] usb 2-1: can't read configurations, error -61 15:50:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 317.877544][ T4672] usb 2-1: new high-speed USB device number 17 using dummy_hcd [ 317.977702][ T4672] usb 2-1: Using ep0 maxpacket: 8 [ 318.118732][T10065] device vlan2 entered promiscuous mode [ 318.125298][T10065] device wlan1 entered promiscuous mode [ 318.192633][T10065] device wlan1 left promiscuous mode 15:50:57 executing program 1: ioctl$DRM_IOCTL_MODE_ATOMIC(0xffffffffffffffff, 0xc03864bc, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000200)=[0x0, 0xffffffff, 0x0, 0x3f, 0x7, 0xfbb, 0x6, 0xff, 0x400], &(0x7f0000000080), &(0x7f00000000c0)=[0x9, 0x9, 0x5], &(0x7f0000000100)=[0xc97, 0x6, 0x0, 0x7ff], 0x0, 0x7fff}) fsconfig$FSCONFIG_SET_FD(0xffffffffffffffff, 0x5, &(0x7f00000001c0)='\x00', 0x0, 0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='sunit=0x0000000000000006,swidth=0x00000000000008sa,\x00']) [ 318.318157][ T1990] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 318.384718][ T4672] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 318.392661][ T4672] usb 2-1: can't read configurations, error -71 [ 318.416619][ T1990] usb 4-1: Invalid ep0 maxpacket: 6 [ 318.447943][ T4672] usb usb2-port1: unable to enumerate USB device [ 318.577944][ T1990] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 318.578442][T10069] device vlan2 entered promiscuous mode [ 318.591721][T10069] device wlan1 entered promiscuous mode [ 318.678866][T10069] device wlan1 left promiscuous mode [ 318.686397][ T1990] usb 4-1: Invalid ep0 maxpacket: 6 [ 318.702515][ T1990] usb usb4-port1: unable to enumerate USB device [ 318.884967][T10077] xfs: Bad value for 'swidth' [ 318.967780][T10081] xfs: Bad value for 'swidth' 15:50:58 executing program 1: ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000036ef68ded9f6128f5123a39cdef34dcd0000000064c4b61815ef0e5c74d0df56b6f7b60464ba0e66bbe715185bbae42306c07d1e3d8da17393299121031ada988d9f6349c70f0dfa1112a3beeaf5912b13ee6afc35f551fe85"]) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000340)=[{0x15}, {0x35}, {0x6}]}) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x0) 15:50:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:50:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 319.613082][ T33] audit: type=1326 audit(1616341859.195:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10089 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f79549 code=0x0 15:50:59 executing program 3: lstat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() r9 = getgid() lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000001740)=ANY=[@ANYBLOB="02000000010006000000000002000000", @ANYRES32=r0, @ANYBLOB="02000500", @ANYRES32=r2, @ANYBLOB="02000000", @ANYRES32=r4, @ANYBLOB="02000700", @ANYRES32=r6, @ANYBLOB="02000500", @ANYRES32=r7, @ANYBLOB="be97c1cffec60f62d6b150029703598eee96f479f853c6f9f4669bd8aaf51252e401bdc9fb0dcd116b93493a89c65d1ba87f55c1119756f717b2f1712c8b143070db31c6ef7816b78d0387293829", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040003000000000008000500", @ANYRES32=r8, @ANYBLOB="08000400", @ANYRES32, @ANYBLOB='\b\x00\a\x00', @ANYRES32=0x0, @ANYBLOB="08000500", @ANYRES32=r9, @ANYBLOB="10000100000000002000090000000000"], 0x7c, 0x2) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x200fe0}], 0x0, &(0x7f0000000040)={[{@prjjquota={'prjjquota', 0x3d, '\xa6\xef\x9bv\xaa\xe7\xab\xcf\xe9\xf6\x81R\"\x890\x8d\xaa\\\x13\xe1l\x8c\xd3DK\x91\xef&u\x98\xa8\x1c\xb4\"\xeej\x01\xf3\x92\xf2\xfd\x16\xf7C}!\x0f*\f\xb3\x1f\x13\x89B\x7f\x89(\xe7\x10\xb1\x89\xec/f\xbek\xab4\xa2\x1d\x8f\n\xe2.\xaeZ\b^\xfb\x95m\x16e\xbb\x90\x02]\x14\x81\x8c\x131C9\v\x94\x06\x92ut\b\x8b\xc38\x19#q^\xf4o\f\xd9Q'}}]}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) splice(0xffffffffffffffff, 0x0, r10, 0x0, 0x4ffe2, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000400)="7e12050299353eafab936e4b7d48d1e9fe1a476b8303f502c476de336b347d5580f0e9a86b6f13a35738e88ffe7c2ab1058f8661bcfd898dbfe1c3d5f294f7b506a82e80f9393b165d7b5bf8793b8319401daf735da032f69fa02609b1557ec1dded490df0fedaf2692ce60b8a8abf71cfcf28a988578991d1", 0x79}, {&(0x7f0000000340)="e2659580fabeca76978589067fee42226bbc", 0x12}, {&(0x7f0000000480)="c1c2", 0x2}, {&(0x7f0000000540)="0a3c51f9ac7ff4369b55342788c6b6352e1fcad62759ba7002c01e07e389f996ec18321a6dcbaa3306a29cd5e94fe754709d0d833a3a464f72937234516352988ff78537acd3c7a38ef5fad8d7affabc861d09714154d3edf065b8f86e494bd2fb0d38943053e54d38e89a74c745f1adfde38aee9efa823347aff9da2359ad308ace6b7ce1e502952795e0a1612211c1b96d9e6f04734afc549bee5d839f7f0370b8f752b2ee331e72eabf64f235158f117e378dd7e58dcf71d19b6434edd99f312d2f522849a79960a09e206e8e9d9ebf4947560d3d1bec0766fd0a90248173f0d9caea7173b845ee9e9795a3a61f38591593f767b0b31606cc0f449c064961bb3c3b2d604808189e5b0e57243eae4e89f16e02713edd8cd977d75ae9fe78cd0dd5391fcc3e34e27db94cdca6da85123a5f496c493adabd43bd1028ba6656055ddc3efd86b330aeb7e400529e32d0c5e9f905ff96f24c0217c7a1457075965f63d8dd4dd737d331124c31d076ff8967c5a07fe5d6723386c59e185632f3b8226ebae8518428b095a7495fb5b413623b193c25419a93c21ae71972620e6a3b3ff6020994a3166f59eb1035e76e3ee18d4055234ac819b2d0ba6511eaa9293da057fd2f4f9cf81c7d48efe3a166ce22184fdcc09e9da59278825fbbe58cf19292a184c02689787198418857e6b3fc9394164812b37970efe2f6f42e1df75fa3a9c519f657cd5a45aacc0c753dc59540857718b89625d9838b32df79bdcb82dfe0442892950c22935b4eb7642168dafd52c07701202b56c9f3544c8974862f310fa30b32f87f2b9f703d3e7bda9f51ece00cdccb801ff1707b12b9a5c2d07412db013bf2b27e8b29e8574bee290b26aac57f2eae05a792a7d6f13053145a6f967580f7baecb081a63a29627401a6194828c07c3d228bcb772329197db01907acf1329f74d1156136510fe1f149120927c15dff734be976035fbfa408a330ba11dc9b78ea549dad67ebb855dad8309ad73b83e2ebce491f2c642d41c907fa14feace6ba58a284a03bba0d62001d089eb34b003ff4c499d475c53330e5db8532ff044d0d9bc5a2ac8e61cdb55821520cefb428fca7ce3c5a29b67b6770aa2a9e3571b2a76ae0e0cc73e32cd000e74c69209e2a8c7f9fd2270f9bc24bc2f545ea4dee2b8a617393e39cb892ebe22d1aa6678b2437039aa83242a53d4c8318e0e8b3a71d470a2bc8280a0fd72011ca007fc39ccd703d63f05c17035f2fa6d72883f4b89ab94e7b44db7525903e0df9efdf82d0d5ca6404278b3eeaf8398b2e68fd1fa605ff79c4d6bc792e07296b1ce3e9cc96eb389e0ac361644e18b12661bfa9688b993a4d4b82bda715abf0747ea2b922d67d1b5ec0c7d1342d89d0ac0dcce9bd46f56c3370f6fab5d3ad8cf67e1b5c5018e90bfcf33646bb22d380c50f8843dda94d09d397da082d61d56817531967c04059705763de557c49c7dea0024a90ad47b2574c43c759d872a55f08d7784db6844e734508867345f642e7b58dd9defbc222eab2081843bf51231a3275f2d87e64373e3edbe483c692acc109da8dbe4f2ca51b8ed0f4eddc0fb2b38a48ae206d2ac0d5de30054cb33cef50dedc4ce06007c56005498684b865bac4500eb226d6b4309cd979d20dcfca7219b2942821ef26dc07c3e32fc6fc7c2873132a8054dd2c83d08099b646378be8acec3c91f5c5ced2ddea1d95ed4abc9906da3288696ee7b9483ff5de2a949946ff05ceed392fa3ce38080f416d0c5d8ffed2522714117dc2338fbf3b6e1ddeed2b3c1085c74e83b85ddd12556d97cb03c5cad818af043aa9c154bd0dde68ed05dd0c470e2a445bb843c5f5114540359ea2b7d19c22cb31299e269562f3bd05b46f6603ec77fa9d3fa715c9a9c12d53594304bd2c8c2afb0116ae4bdc8d09f38109f5b8a7f2dccc71d303e18873e5944805e25ce77d7278294ceacb2b1da45877235db4e7e39120d22bb6bffd792fdf0cef382a456d7e8a9444ffd771951f7bb17cba95f9ff14023f92106c5d6ec662b65447cd3a8fac145ddfa26b16726c39c9ac8bf31333fcfb748dfc49c1c0560eacf977edbc5491923e0f41db7aadf0a9ec3fde02b67d2209a107c384d0544f24d754f8f4ae7009046e323c2f9a805704961b2c3a4f47ba177c3cf8667bb49d2408594720fa515d39bb5668a173babbb07c2a278981813a9e75f70cd77ab4f414dd795caf013100c17616048dc64572ca064ab083ba5968c09d5d0e1d8f17c76a91abed81603c90e3a83c9a4c0f64e301d31e528d010a367805d5ad89540aeede5c985d0e1f6732363dc937e13605bcac73e8072dec94c425cf7590b12403904ab77ffad6029e67df9417343c32426f71c7c27d11094130a175474c181a30e74396e3f1ac6d78634c407e6df4ef23007323bf2fd48b8abc5230ecb09659f2811eec54f43914815ebcd052be029575fd455f8ad5c4cd1d5c56f34359c85f3313aa6e3d4e90288c3152a57a819692a01ec23e8ae921159e96e60c31166bf697fd8077aa45ad8f2c733de8fdd5aeadb33f85d1f495d915bf1f2f17a674fe8ebe7754b6565db0f3f069f4e7b5eceb020e4e3b13e3484ae831d4cff97f2646fbd2a302c8d99dd898ccd72af42d1c498cadf6b495cebb7349afbf4841864ef0b9a730e7c79ef76b3c0645df395993bb68bdf7f3bc68e06b3963c3eb7902bf4827763b5b4f2ab9a34fb7c5eec3f60bf2a5e20944b91e83e74efc3ba686a9e0ddfe6096c8b4cb80a99d333d32b8249229a52423684c8b9c999f4a44d520435ff668d5b74878061b1651fe02e59e1ab7dbb4fd4af8414a09db1da6a230e78712bb7bc454093597b51b314ba7f09bf21aca5e7eafc42728d247903d8f71e5b5e7de045802d416855723b1c2b2f4c5ae9c2dde63d1c72c039e59e08b28e8cbe546976f03c2ec7f48e1522da7525d3f5982efab7e6863949559142d15f90afbab39bc3f5232258f0cd8f7baf135420235aec0c753d63a1df513ec2052e35466ec9398fd29d2fe0dddeeb5c5a7e97b9fa927c2aa7457ad12ef2779ed77a4bad646300d705cd1d56d1817e29c3a253a027e90858e994041a600ae73fdb878634bd2149b0a6c4c9befa7a0e424dee0e4e221f6f042e16269e7075881b3d3ab420766aee73393027f01a99abb01d280819e572595fb24822b317f3407ab1623d25b2fcbdcdf444702783c210b7a848636481bc445feeb361bccb2a8be5c62ed1d37e80a35fb45c245a818d540c0f38acfef53aad70205cb25934659e2ae6e14e2e07644f61f6081be1b213db2da3f48f93b89e7db0c6c482176540daf6f89fe45a19922e122be29d6a0e32582a15f689e857d41cb5c5d1471af792eee9551d8417318a1a558c5d34ee463a2a3199390cc513c9b404c3dafa3f3a3b70474e5d6012214a7b68022c90e04709f1b69566b8c6fc231331bbe97e4b8b662001371091eb928c48b58329b081a43d8463fd5e26c91681ba0480020e26aaa1be993e427216a3012af9872c92a08de729587f8b3e49c9a2116a42b87bfe8e114d31fc4bdfa845da04c0c3680d155eb2384bf7004e7c9662171bee9890121fc246f07b52b0de028f9c2a594b3eae74c5c46f19994a541ca11b0591fae0ed044b2758a04c8aa134f4912acba4e442caf5cabe0b054b3fd9851f9f36a58c30824fd5a597c702f804d45629f61767db82b703efa177a9938bb648060d28350ff732bb5c030d14d546c5b46245f322bf6079cdfb148459df010457f08298c005283bc832f417c5bb197d30a440e292eecd5f5e4abc743165aa4035335e8855ea45d84cd3062616737a97f70854ee327f191ad1df248b30b5467e98cde2f6cb9fd2e2ff899232a4959240119c91aff2ec05960e0907d60c6cb92f2bd23ef1fdc1930575f0c2cb3892bcda891727500f4d700c3b10e45ffc07815e32fe64c7826d2045e213c37d44fb9dd012bdd0b8479a8c1e0484ee7990e2fd6193ba408fe9af240ce0f1a9ddc9c0befb245435c9eafb76b00b3470b86670139e445372ee57fc460b707c10483afe2c975313d3a6dd100293077dfdfb2b84b4492434dd57d422f61e9cca1e734b28143f15fc622172b68d5b4eba94a00c0a0ff435e4cf085c67150ea4a4dc52b2614340665df8ae7a8228f3697c3773ab7e59872e0768c30a083f984646eaa0ce4b07d8626115ebf2641c9e0252d9900e7e47875dcce99bf93a01f7f436eca8a2724f60d4151b27e511ca0d2488c2aef7b85f4654d5779bef3d1775dd5c5677e82da734973dfedfe244cb94bc0b677b8234c5c00c44f095ab9ab3a00d7221764b8e83da03c6181559269ab4b9ef71ea465b8d57d4a2cfeeeee23c3ab742c7509043e4185b1ae6d32067964d65608cd8278372c055671cb1b8790cc3e207805050bc5a286f07bb7003a6ae7e47678c5eb4c16043a341ac73b8ece2499372c0aec93e1440638d801c0658f8ca7db66358d757d93f34a7f7431e8701b4a3ff072f4140fea12f0189a34b175cdfbcbfba27928bf652efad0384df0cc1fe98f1433a7ba042afb1242ec0ae8cbf3387f7ce94345a014fde6f894aebf9a6c7fa056fee7555340bf993b00c4b69a3dff308cb3687a376a75156addb3d0d5d923018a0886a01359fea95b81a7abc8c65c099c097ed927dec67e5c654ba281d0877c2318dff0cccbcc851233314c4a5858f220d622b820d1c97f6cce3a53c198a3e5c22167fd8ab9ef47642b2caf4784a43cf18c3cd59731fea9a1ce494c37d1c4e283bb57ad45dfbe77cc71bff287547d4c6578c57d20a9d16c3df3ddd23fc90921ae4d15a5291730173f9e40e450af6de71fc6181b69fa80aa41d69cb2a65d9bc27842d198652fd937a61d23e85371cf924a77daf64df42f491efd1af9122dd5bdcf7e515cf134976b343d0a4e1afc97c86fc7ecf2ff976e49e8c02f3a4ab5c0d967b09bc5889174c3090fc017944e5829ea56bf8854979e0b8ac0c6350684874cf6b7da7caf3ecf559f5285d55f0b71e679c4c06b39863a75358b212ba44d2bcbb3a9ed2f56ad04d7dc1c8b8c6c61f6b41524ffc36842a89b1fd2c7d16bca9cc6bdaafd47ae2d131a31ea2057f393e1300fb29dedf1f00646c0221efd27a5596aa4700f1748e0a5dd969ff2960682927a5a3bdfa30945a30e81272b6a2d882ba064c930aebbc1e632ed9286477d8a68003f52b2cd7ba6615c152e8d64a8fb239a5d29cb575deeab2e1873dd15177cb4a48ffaba08c56a864a02c2a5b3b59291489750829f99d3e5aa011e3885e1f7a44d82bbca67602b68b13370ccd872b334c4d35b5ace3705cf464aa826bec6f190260ff42618597cdcf3383af73032df8d489bdf6acf726787b7a5bf723c03024f83ef6fe099e2dd38a08eed4252f5499b861a217fc49634987d614074ed1eddcda7b4f7ee8d435494fd6c8adb26f9ec024cb3fd79520428dce39be388610f6afa297a252534b124437ef8e4baf53117956b399553b146f09962c767cde7c483aef673234937f60f5f0142e14274678dfeb592392cab6fd6cbb641b37375c3857b4b76878151808440520128e648df216f2b22a7503d876aedc68742ddd5e84c3815279afe62895b974cfd62c015e7db5f3760e7a700e783e252bbc2b52c0833dff6c05dcda3496a3f229edff0774fea18529a9861f47f9043a85073551c87df9b548aeb77c3c8b7b0101de75bcc1c61b40968e08d8b4832b483115b234ba20171d8bf75d6b7c3a1b1a6b5c0b88469d8bf1f0240ccd2", 0x1000}, {&(0x7f0000001540)="6ddd993b5c4f8c120a4d06147e5b047e803d907abea2deb7355850bc771fb8189e0d2ca26f755115eda27285ceeaa23366a462198fe696b7f0e054a1d472817ae3d07eba1a01a2fd0f", 0x49}, {&(0x7f00000004c0)="8c", 0x1}, {&(0x7f00000015c0)="cfede9927235ef4e619f6052a0e5fae73b1dce6dafd65d4214d991fd94ed1771ea880984df3f604c38f673ce307e939f713c2180d9dcc0527eddbf94412d8db1aee9a53f047a42b6dc8636b147432e382deceff8c6977955ba733f8bb1458b92647ae72de2", 0x65}], 0x7, &(0x7f0000001680)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_addr={0x44, 0xc, 0x9d, 0x1, 0x9, [{@rand_addr=0x64010100, 0x3}]}]}}}, @ip_ttl={{0x10, 0x0, 0x2, 0x100}}, @ip_pktinfo={{0x18, 0x0, 0x8, {0x0, @local, @local}}}, @ip_tos_u8={{0xd, 0x0, 0x1, 0x40}}, @ip_retopts={{0x28, 0x0, 0x7, {[@timestamp_addr={0x44, 0x1c, 0x8, 0x1, 0x7, [{@broadcast, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x1ff}, {@private=0xa010101, 0xdd}]}]}}}], 0x78}, 0x40044050) open(&(0x7f00000000c0)='./file0\x00', 0x101042, 0xc0) [ 319.898084][T10096] device vlan2 entered promiscuous mode [ 319.903792][T10096] device wlan1 entered promiscuous mode [ 320.009808][T10096] device wlan1 left promiscuous mode 15:50:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xb0, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @mon_options=[@NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MNTR_FLAGS={0x18, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "ef34285150eb485fbfb7451f1893b2b7a6f619330e436d2a"}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4000) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x0, 0x3, 0x1, 0x22, 0x1, 0x400000000}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="080024bd7000fddbdf252100000008000300", @ANYRES32=r5, @ANYBLOB="080077d7fbfff1ff"], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0xc4) sendmsg$NL80211_CMD_SET_KEY(r4, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="9106abb7d37932411e2c71fae7c310b3cd56ad4387bc9ba94b7289a76574e98674f2e3933d627047ba5373eca8d452a95171edc8cac398620c00c0681c5eb000a4b01a509972462c23ac61183f3bedb9374fe2ead320fa03adeb7517ae7a09efd33cf2", @ANYRES32=r5, @ANYBLOB="9413000a00243c062bd5b4aabcf6198b9f6e66090020005080050009000100000005000900000000000a000400d5dfc8a7c5b200001100070000000000000000173bb549fc7c000000"], 0x70}, 0x1, 0x0, 0x0, 0x4004005}, 0x4000030) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000012c0)={&(0x7f0000000640)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040027bd7000fbdbdf020000000008000300a44846fed95c8ef7d0f9ab588ff9fa54954194ab74363242f3c3f9b56be2eb0dd0b0a70d7e576dd9f58b2cd5e067e0fd7444bc33ef84f0f5a51beee55e683515929c8aa47548d72f1bbd8c870010936df10c939bc76ddf01f9866fd419abfa934870b984db76ae5215640f36f8c7382ea144712de4698339e969dce7dcaea0a841d88eb86e89d289a592d4c2c9e23fbb", @ANYRES32=r5, @ANYBLOB="0c009900d6000000470000000500ee00850000000800ef000e000000"], 0x38}, 0x1, 0x0, 0x0, 0x4004}, 0x40) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x48}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x5c}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x5a}]}, 0x40}, 0x1, 0x0, 0x0, 0x200048c0}, 0x8000044) sendmsg$NL80211_CMD_DEL_STATION(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="16f31a6d", @ANYRES16, @ANYBLOB="000429bd7000ffdbdf251400000008000300", @ANYRES32=r5, @ANYBLOB="01001400", @ANYRES32=0x0, @ANYBLOB="06003600000000000c0043004000000007000000050029000c0000000c00430001010000030000000600b5009b060000"], 0x54}, 0x1, 0x0, 0x0, 0x8001}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x60010100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x13}]}, 0x28}, 0x1, 0x0, 0x0, 0x44050}, 0x880) read$FUSE(r2, &(0x7f0000001040), 0x1000) [ 320.407180][ T33] audit: type=1326 audit(1616341859.995:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10089 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f79549 code=0x0 [ 320.536252][T10097] device vlan2 entered promiscuous mode [ 320.542119][T10097] device wlan1 entered promiscuous mode 15:51:00 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) accept4$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x80000) recvmmsg(r1, &(0x7f0000000280)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)=""/222, 0xde}], 0x1}}], 0x1, 0x8140, 0x0) [ 320.655653][T10097] device wlan1 left promiscuous mode [ 320.787727][T10111] input: syz0 as /devices/virtual/input/input9 [ 320.911217][T10111] input: syz0 as /devices/virtual/input/input10 15:51:00 executing program 3: r0 = socket(0x1000000000000010, 0x80802, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x0) accept4$rose(r1, &(0x7f0000000040)=@short={0xb, @dev, @null, 0x1, @rose}, &(0x7f0000000080)=0x1c, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) recvmsg$kcm(r2, &(0x7f00000013c0)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/139, 0x8b}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/147, 0x93}], 0x3, &(0x7f0000001380)=""/47, 0x2f}, 0x161) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000000)={'team0\x00'}) write(r0, &(0x7f0000000100)="2400000052000100000bf4f9002304000a04f51108000100020020431cbad580012f152d", 0x24) 15:51:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000, 0xb4, 0x0, 0x8, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002301000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000fcfdffff01000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af3010004000000000000000000000002", 0x39, 0x4c00}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000540)='system.posix_acl_default\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="c8a9232b5025e1a05ff7b6019ffbb58e8d7b1b37f09c26cc8d201bc6990a30141ad451cde536b23a1f32ec526b08fef3ca266f240b3484c520be3e3c7bf471c21d4436d6f5ad9376a7d65e5a2e08212b6c3a7d2fec42f8fc3e5f24b7d8dd8d31229bcfb02e8e5b05cd3f62005dbe9a7f6ad3504fd9285924af71d21c65fd20e90fd54937e3ab8ca7fdc54ae5a21d6d0546fe8f2bd1dc0cf24886999a9f615bb73734ee34cb41f0078892e5c1fc38587d41167e1552d1fa1a4fb742d9", @ANYRES32=0xee00, @ANYBLOB="040007000000000008000000", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x4c, 0x1) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40012100, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/100, 0x64}, {&(0x7f0000000380)=""/44, 0x2c}], 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x8140, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000000000061130c00000000008510000002000000850000000500000095000100000000009500a505000000007751e89a67fa7e32fe0231368b2264f9dc3f45f9f60500000000000000522be18bd10a69b043ccc42646d25dfd73a015e0ca7fc250ab0f68a7d0f7f8ff9b173a649c1cfd6587d452d69e5fbbd665cd15007cc957d775783559c35da860e8cfbc6f2b2a3e3173d56604d855e31c04a0cdd6972de5f440b6ebbd053095d6450000204a34cffcd43efd19be8fb026d9b4321f73ffdf93d750e17ea7650fd263ec0738540000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = openat$vcsa(0xffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x40000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f00000002c0)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00', r1) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x100) ioctl$FS_IOC_GETFSMAP(r3, 0xc05812fe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, 0x0, 0x2000c880) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x3c) fstat(0xffffffffffffffff, &(0x7f0000000780)) lsetxattr$security_capability(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)='security.capability\x00', &(0x7f0000000980)=@v2={0x2000000, [{0x6, 0x2}, {0x0, 0x8}]}, 0x14, 0x2) umount2(&(0x7f0000000040)='./file0\x00', 0x8) lsetxattr$trusted_overlay_upper(&(0x7f0000000680)='./bus\x00', &(0x7f0000000700)='trusted.overlay.upper\x00', &(0x7f0000000740)={0x0, 0xfb, 0x2c, 0x0, 0x6, "67b61effdd995f611f4d39ae503e428d", "2e8fe0ab601f8c279e0b50fefec65b51e86aed8aa7f7c8"}, 0x2c, 0x3) 15:51:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 321.579802][T10130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 321.662657][T10132] loop1: detected capacity change from 4096 to 0 [ 321.758017][T10140] device vlan2 entered promiscuous mode [ 321.764935][T10140] device wlan1 entered promiscuous mode [ 321.811490][T10132] Quota error (device loop1): v2_read_file_info: Free block number too big (0 >= 0). [ 321.821904][T10132] EXT4-fs warning (device loop1): ext4_enable_quotas:6433: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 321.876559][T10140] device wlan1 left promiscuous mode [ 321.892950][T10132] EXT4-fs (loop1): mount failed 15:51:01 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) bind$bt_hci(r1, &(0x7f0000000000)={0x1f, 0x3}, 0x6) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) close(r3) ioctl$sock_bt_hci(r0, 0x400448ca, &(0x7f0000000180)) 15:51:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x29, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)="1f", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f00000008c0)="9b", 0x7fffefff}], 0x300}}], 0x3, 0x4028040) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newqdisc={0x3c, 0x24, 0x300, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x6, 0xfff3}, {0x6, 0x18}, {0x8, 0x18}}, [@TCA_RATE={0x6, 0x5, {0xfe, 0xf7}}, @TCA_RATE={0x6, 0x5, {0x2, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040000}, 0x8000) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) fcntl$setstatus(r3, 0x4, 0xc00) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f00000002c0)={0x1, 'macvlan1\x00', {}, 0xb64}) set_mempolicy(0x0, 0x0, 0x200) clone(0xc0090000, &(0x7f0000000000)="60d4cddee0b90618edc035b76394e4b6de23288f72dbe5287679bf5bf8247728786ada3f3a6c17b3899d221d3035634b1f32430f9f148d0eba9f5497ffa803b325fd17c94cc2649f1e5372dd24f7dadd58178bf168ee5b63afae7c7f2eac109f392144036e3a1812c705a14bc6e7f226eb244dedfe3956dd49d72dbdef90a8d9efcf07d4e6bf6d579d5d0680980fbf028a1f6c58b87a8a66c84ed989f22d57bf5310907582c2adf0ad6cf89fd67be53b69d7d382c834c0085b78b2ba", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="e25049a4bfef78825bbb31236a3764f5f56e89bcd003d003b41f6c2bff9f6552561ce86f0db33bca84a1466994f28c1d311ee011940a1b10ad1e56d8f5b1") [ 322.399384][T10146] device vlan2 entered promiscuous mode [ 322.405171][T10146] device wlan1 entered promiscuous mode [ 322.432234][T10146] device wlan1 left promiscuous mode [ 322.837194][T10161] IPVS: ftp: loaded support on port[0] = 21 15:51:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000), 0x9f) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc10}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x300) splice(r2, 0x0, r3, 0x0, 0xfffd, 0x0) connect$l2tp6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x4, @remote, 0x250, 0x3}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) accept4$nfc_llcp(r3, 0x0, &(0x7f0000000640), 0x0) r5 = syz_mount_image$zonefs(&(0x7f0000000140)='zonefs\x00', &(0x7f0000000280)='./file0\x00', 0xc7, 0x2, &(0x7f0000000480)=[{&(0x7f00000002c0)="80de3861effb8c07d95a1a38a405c989b7b1e3420bfebe8a30d3f4e6b16de87493dc6644f615d4ad0c7580096547a031c42a8f038f8e3b0edf99a679bbd54a460857acc9b42b8e730d771af3b5db2133ad6acdec73f336ee19df2742354514608024435492f211f4614f08e01dbbabc3cc04e54d703d4e9c0899abc215340a41ac987830200faee5dac287624623d3531e4b5740da04e978ddefdf38be8b923d37d3e4e08784f2bfc1dfbe66b28b594ba48032399e16f67bbf7ce3c13c3683ab5feee97afdf2bd7925c979d33409463db9e28f0457416fbb9c", 0xd9, 0x7fffffff}, {&(0x7f00000003c0)="3171e4220ca8114e1c97933ed46bd5600fe4474fcb6aeccabb8c97d95df58b8ffe6c43b290755917479f8d6bc494f2f60c65f9f56ba61c5430739850c565b383bcda3785a671bd91173288e6b83f15c0a1ccf90c49890b5781dce67039fdbb276a555c835e2bcbe4611238fe13cc919856ed6ed54988d8bf5f22e5a9a38bf7b8d24818ffa4d1e103013f73822abd0cb1464d59c48439a9faca976b2ff60455fa79147c2d3634c814ccd37b78c615c93898f877932166c71eec72e3c3d89bfcce", 0xc0, 0x59}], 0x24082, &(0x7f0000000840)=ANY=[@ANYBLOB="6542000000733d7265706169322c7063723d30303030303030303030303030303030303033302c7365636c6162656c2c7063723d30303030303030303030303030303030303031382c7569643ca2b83c16cd6f8e88a8c5bfcf6d76024c2306062fdde212a14e05f78506c9bbd69c91b39a21b84778c0867195a461f3523a112df66dba3fbbc1c3aa5c6a7bef84fcd212e4a97a0bf93d75c91720bbb11bae5a343d4c475c441d58e2b87b38768ad0b310a6e4d135722cceba6aa23068c9203ea6abc80f2cd9d0dce815a15438e24865e9fcf0f1f7fb1a6262fcaba90e4755f51917af888f", @ANYRESDEC=0xee00, @ANYBLOB=',pcr=00000000000000000049,mask=MAY_EXEC,obj_type=-\\,rootcontext=system_u,subj_type=\'\',fowner>', @ANYRESDEC=0xee01, @ANYBLOB="84c130f33b54a1f97713669032ee15e6defab53264ed484665bd0871"]) write$binfmt_misc(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="73797a30730e36bee4dfb79cbcc093496337a0f1e50fbb1ee384bd59ca4b03fabfef9d54b63a8091d1f3e9f55d4d3962720a165322c2c67488b8270e4216345d3c"], 0x41) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x800000000009031, 0xffffffffffffffff, 0x0) 15:51:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 323.424638][T10160] IPVS: ftp: loaded support on port[0] = 21 15:51:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x29, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)="1f", 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f00000008c0)="9b", 0x7fffefff}], 0x300}}], 0x3, 0x4028040) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newqdisc={0x3c, 0x24, 0x300, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x6, 0xfff3}, {0x6, 0x18}, {0x8, 0x18}}, [@TCA_RATE={0x6, 0x5, {0xfe, 0xf7}}, @TCA_RATE={0x6, 0x5, {0x2, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040000}, 0x8000) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) close(0xffffffffffffffff) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) fcntl$setstatus(r3, 0x4, 0xc00) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f00000002c0)={0x1, 'macvlan1\x00', {}, 0xb64}) set_mempolicy(0x0, 0x0, 0x200) clone(0xc0090000, &(0x7f0000000000)="60d4cddee0b90618edc035b76394e4b6de23288f72dbe5287679bf5bf8247728786ada3f3a6c17b3899d221d3035634b1f32430f9f148d0eba9f5497ffa803b325fd17c94cc2649f1e5372dd24f7dadd58178bf168ee5b63afae7c7f2eac109f392144036e3a1812c705a14bc6e7f226eb244dedfe3956dd49d72dbdef90a8d9efcf07d4e6bf6d579d5d0680980fbf028a1f6c58b87a8a66c84ed989f22d57bf5310907582c2adf0ad6cf89fd67be53b69d7d382c834c0085b78b2ba", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="e25049a4bfef78825bbb31236a3764f5f56e89bcd003d003b41f6c2bff9f6552561ce86f0db33bca84a1466994f28c1d311ee011940a1b10ad1e56d8f5b1") [ 323.785733][T10212] device vlan2 entered promiscuous mode [ 323.791486][T10212] device wlan1 entered promiscuous mode [ 323.831051][T10212] device wlan1 left promiscuous mode [ 324.264891][T10221] IPVS: ftp: loaded support on port[0] = 21 [ 324.392322][T10217] device vlan2 entered promiscuous mode [ 324.398457][T10217] device wlan1 entered promiscuous mode [ 324.481671][T10217] device wlan1 left promiscuous mode 15:51:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:05 executing program 1: r0 = fspick(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000000c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x6, 0x0, 0x0, 0x0, 0x71, 0x11, 0xa8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff, 0x0, 0x0, 0x7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 325.565326][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 325.571963][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 [ 325.610723][T10258] device vlan2 entered promiscuous mode [ 325.616673][T10258] device wlan1 entered promiscuous mode [ 325.660126][T10258] device wlan1 left promiscuous mode [ 326.050460][T10257] device vlan2 entered promiscuous mode [ 326.057348][T10257] device wlan1 entered promiscuous mode 15:51:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$cachefiles(0xffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x80000, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4000000019001007755dd155c3d90f4e2bbd7000ffdbdf258010200000ed006ce880edf6edc86a540020ed9052ffffffff0000000000080059"], 0x40}}, 0x40) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=@setneightbl={0x54, 0x43, 0x4, 0x70bd26, 0x25dfdbfd, {0xa}, [@NDTA_PARMS={0x10, 0x6, 0x0, 0x1, [@NDTPA_BASE_REACHABLE_TIME={0xc, 0x4, 0xfffffffffffff04f}]}, @NDTA_NAME={0x9, 0x1, '/[+!\x00'}, @NDTA_NAME={0x5, 0x1, '\x00'}, @NDTA_GC_INTERVAL={0xc, 0x8, 0xb9}, @NDTA_THRESH3={0x8}, @NDTA_THRESH1={0x8, 0x2, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) [ 326.163214][T10257] device wlan1 left promiscuous mode 15:51:06 executing program 1: r0 = openat$autofs(0xffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) getdents(r0, &(0x7f00000003c0)=""/199, 0xc7) prctl$PR_SET_SECCOMP(0x16, 0x3, &(0x7f0000000000)={0x2, &(0x7f0000000140)=[{0x7, 0x6, 0x0, 0x7ffc0001}, {0xfff, 0x80, 0xff, 0x1}]}) connect$unix(r0, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e22}, 0x6e) unlinkat(r0, 0x0, 0x200) recvfrom$unix(r0, &(0x7f00000001c0)=""/138, 0x8a, 0x40000000, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) 15:51:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 327.226504][T10281] device vlan2 entered promiscuous mode [ 327.232173][T10281] device wlan1 entered promiscuous mode 15:51:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0x24040006}, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000400)={&(0x7f0000000340), 0xc, 0x0}, 0x40000) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x80) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000002c0)=@req3={0x3, 0x7ff, 0x7, 0x7ff, 0x3, 0x3, 0x7}, 0x1c) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x58, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x1}}}}]}, 0x58}}, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537503e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801601842fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 327.323209][T10281] device wlan1 left promiscuous mode 15:51:07 executing program 1: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_congestion_control\x00', 0x1, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000080)='westwood\x00', 0x9) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r5, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getstats={0x1c, 0x5e, 0x100, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, 0x2}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x800) splice(r0, 0x0, r1, 0x0, 0x4ffe2, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000000)) [ 327.892403][T10291] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 327.978071][T10293] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 15:51:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:08 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f00000000c0)={0x9, 0x1c, 0x555f}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000140)={0x7fffffff, 0x1, 0x2, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc10c5541, &(0x7f0000000140)={r2}) r3 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000080)={0xfff, 0xff, 0x9, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, &(0x7f0000000180)={r4}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00464b4, &(0x7f00000006c0)={r4}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000000206030000000000000000000000000005000400000000000900020073797a320000000005000100060000000c0007800500150007000000050005000a00000011000300686173683a69702c6d61726b00000000780d49ee84ddc75384c9a3f001e0b5"], 0x58}}, 0x0) r6 = openat$proc_capi20(0xffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x8300, 0x0) sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000640)={&(0x7f0000000180)={0x4ac, 0x0, 0x4, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xaa}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x710b4e98}]}]}, @TIPC_NLA_NODE={0x260, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xc7, 0x3, "4d5577dda753c279c7ac17b25f92e6c690dd2c95e4736680b09fe82c6e2bdd236ed84dc48b323366df852b32d6c9729e29f9100153839a528d98c2dcbf9c3ffe91e4ccf325c3fed8c9f160b235039b122c84a336ee79fe43453ee58c39b4e16a2ec4c3ddab665da55a0c715149aac04eb2eae8dcb0e630f55fbc2d95793eaba67f1eefd708e40a32faf8070aa9da09c105291dfd01348652cbf3b2580d9b19395deaf12cf23dc71206a25d0443dcd06a1b7410cbbf0e352222fe373990e8fd82178cc4"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ID={0xd9, 0x3, "01b18bd892b13f7c4f86d04ce43c19a48c704c39a93b935bd57b40b5bd2ff9aa874b875ab0efe857c15f258a2d4c239a3edeaddeac222caf701d2ebd27a9a23546832033897ec2d0cbe51d75ba8d5619bff88dd35399f5ffd4d92462734756a8303681003386e150fb84b9cbbc15820f1b664f4e86bbd471d3fbd302c8113966a9289b119fed0d0287a71959ec496ddd5d6c9584121d82dda1402d8796616a922eff22f425f639ceabd58bdfaa44f97ed3261a7787af76216554eed9fdd4877b176ec280e9fa2a061ba5f2936c0e5500c3e5d1266b"}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "36689e28557e688cefe7e188b127c6ec2f9a0c812814c5c4d5"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "f42934cbcbe9ff36b22dd855f0fc40a0dc19d1877310a20ef622aa4425"}}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x46236fae}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffa}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x401}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x81}]}, @TIPC_NLA_NODE={0x168, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xca, 0x3, "3c5530a77507696a54821ba8bae7d215cc1b77d8c4926fe21c25a85d3086bfd3bb45e3c5725e4cce225926eacf78b42fbc624a24db78baa59c17c73733c16d233269eb61955318eb072fd729d02cdb061d494c65bcbc4fd5ff3cd0beaca08a0b79393709f9763dc96110abe72f2929240ce305b77ce46f54aa435a04ed94676245100ca99e03d3fa11d7f62ef305b2319a07ce6c5499e865688b2a2b9087e13097f8eb47f2deca1ea7b7cc05c09dc1e0f836c88ba4cf48e4e5f66daa706ee66f98e0644de588"}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "d95d9c52e8ea3f208e35e8dbbdc5bdd4eaf7a546ff6f03bfdbfa2df3f052223c"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "624b2caac1ba7024080eee8f804587524ecffdd959d7"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}]}]}, 0x4ac}, 0x1, 0x0, 0x0, 0x800}, 0x80) 15:51:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(r1, 0x0, r2, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 328.834664][T10303] device vlan2 entered promiscuous mode [ 328.840428][T10303] device wlan1 entered promiscuous mode [ 328.908030][T10303] device wlan1 left promiscuous mode 15:51:08 executing program 1: ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={'veth0_to_hsr\x00', {0x2, 0x0, @dev}}) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x400017e) r2 = openat$pfkey(0xffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x614800, 0x0) inotify_rm_watch(r2, r1) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) read$FUSE(r3, 0x0, 0x0) 15:51:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:09 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, 0x0, 0x0, 0x0, 0x60}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x2, 0x9]}, 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@getqdisc={0x34, 0x26, 0x200, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffff, 0x5}, {0x5, 0x10}, {0x9, 0xe}}, [{0x4}, {0x4}, {0x4}, {0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x880}, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x0, 0x300, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES_HIGH={0x8, 0x14, 0x8}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x10000}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_IRQ={0x8, 0x9, 0x7c}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8, 0x3, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44004}, 0x40040) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000427bd7000fe"], 0x28}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount='errors=remount-ro'}]}) [ 330.141675][T10325] device vlan2 entered promiscuous mode [ 330.147568][T10325] device wlan1 entered promiscuous mode 15:51:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 330.212038][T10326] loop1: detected capacity change from 1051 to 0 15:51:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 330.285390][T10325] device wlan1 left promiscuous mode [ 330.298410][T10326] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 15:51:10 executing program 4: recvfrom$x25(0xffffffffffffffff, &(0x7f0000000000)=""/93, 0x5d, 0x10000, &(0x7f0000000080)={0x9, @remote={[], 0x0}}, 0x12) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x12) r1 = openat$audio1(0xffffff9c, &(0x7f0000000100)='/dev/audio1\x00', 0x8801, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000140)={0x8, 'virt_wifi0\x00', {'netdevsim0\x00'}, 0x3}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDCTL_DSP_SUBDIVIDE(r2, 0xc0045009, &(0x7f00000001c0)=0x8) ioctl$SNDCTL_DSP_GETIPTR(r0, 0x800c5011, &(0x7f0000000200)) r4 = openat$bsg(0xffffff9c, &(0x7f0000000240)='/dev/bsg\x00', 0x800, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) write$binfmt_misc(r3, &(0x7f0000000300)={'syz1', "38136c505182b50cf432094d40ec853ff383499a37333e20bfccfe8c271138c98c66d7179507442b0767f3995754526f1b3a904218e063c88cbf5289d1530c073e5dfb9c667e8840a318be36745ac2a05ef48447cde7417c9912772fd7"}, 0x61) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000003c0)=0x5, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000400)={0x1c, 0x8001, 0x4, 0x23, 0x8b8, 0x0, 0x3ff, 0xffffffff, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000480)={r5, 0x5}, 0x8) r6 = openat$cachefiles(0xffffff9c, &(0x7f00000004c0)='/dev/cachefiles\x00', 0x8000, 0x0) r7 = getpid() fcntl$setown(r6, 0x8, r7) r8 = openat$btrfs_control(0xffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x90040, 0x0) write$dsp(r8, &(0x7f0000000540)="ab9037a01443ca3972", 0x9) [ 330.404112][T10326] EXT4-fs (loop1): orphan cleanup on readonly fs [ 330.411035][T10326] EXT4-fs error (device loop1): __ext4_iget:4848: inode #3: block 536870976: comm syz-executor.1: invalid block [ 330.579783][T10326] EXT4-fs (loop1): Remounting filesystem read-only [ 330.587886][T10326] EXT4-fs error (device loop1): ext4_quota_enable:6393: comm syz-executor.1: Bad quota inode # 3 [ 330.747992][T10326] EXT4-fs warning (device loop1): ext4_enable_quotas:6433: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 331.023946][T10326] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 331.031478][T10326] EXT4-fs (loop1): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 15:51:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 331.859068][T10346] device vlan2 entered promiscuous mode [ 331.864895][T10346] device wlan1 entered promiscuous mode [ 332.007331][T10346] device wlan1 left promiscuous mode 15:51:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:12 executing program 1: r0 = openat$proc_capi20(0xffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x16) r1 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) write$6lowpan_control(r1, &(0x7f0000000080)='disconnect aa:aa:aa:aa:aa:11 2', 0x1e) 15:51:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x9b, 0x63, 0x11, 0x48, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f00000000c0)=""/195, 0x0, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0xfffffcd3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r1, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) splice(r4, 0x0, r5, 0x0, 0x4ffe2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xece0, 0x0, 0x0, 0x0, 0x7fff}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0x9, 0x2, 0x8, 0x40, 0x1}, @ldst={0x1, 0x3, 0x0, 0x3, 0x2, 0xffffffffffffffff, 0x10}]}, &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x8, [], r1, 0x18, r2, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xc, 0x19, 0x53}, 0x10, 0xffffffffffffffff, r4}, 0x74) [ 333.654322][T10366] device vlan2 entered promiscuous mode [ 333.661495][T10366] device wlan1 entered promiscuous mode 15:51:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 333.754156][T10366] device wlan1 left promiscuous mode [ 335.753690][T10379] IPVS: ftp: loaded support on port[0] = 21 [ 336.304169][T10379] chnl_net:caif_netlink_parms(): no params data found [ 336.459636][T10379] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.467031][T10379] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.476769][T10379] device bridge_slave_0 entered promiscuous mode [ 336.496310][T10379] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.503792][T10379] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.514336][T10379] device bridge_slave_1 entered promiscuous mode [ 336.568083][T10379] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 336.586324][T10379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 336.643921][T10379] team0: Port device team_slave_0 added [ 336.657934][T10379] team0: Port device team_slave_1 added [ 336.710566][T10379] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 336.717847][T10379] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 336.747117][T10379] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 336.765463][T10379] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 336.778007][T10379] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 336.808273][T10379] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 336.881534][T10379] device hsr_slave_0 entered promiscuous mode [ 336.893096][T10379] device hsr_slave_1 entered promiscuous mode [ 336.904160][T10379] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 336.912141][T10379] Cannot create hsr debugfs directory [ 337.244200][T10379] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 337.279827][T10379] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 337.316518][T10379] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 337.356630][T10379] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 337.614887][ T8453] Bluetooth: hci4: command 0x0409 tx timeout [ 337.672780][T10379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.713243][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 337.722555][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.747262][T10379] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.773633][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 337.783601][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.797421][ T8453] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.804813][ T8453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.824304][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.847469][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 337.859589][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.869086][ T55] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.876438][ T55] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.906757][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 337.924071][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 337.960682][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 337.971334][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 338.008846][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 338.018821][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 338.029407][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 338.050703][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 338.063124][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 338.085536][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 338.096805][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 338.127495][T10379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 338.199607][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 338.207571][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.239173][T10379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 338.457588][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.467652][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.545411][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.555280][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.581286][T10379] device veth0_vlan entered promiscuous mode [ 338.591612][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.601085][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.640879][T10379] device veth1_vlan entered promiscuous mode [ 338.723119][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.732722][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.742393][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.752518][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.776642][T10379] device veth0_macvtap entered promiscuous mode [ 338.799628][T10379] device veth1_macvtap entered promiscuous mode [ 338.868361][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.880973][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.892195][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.902966][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.913176][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.923939][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.934110][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 338.945055][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 338.959228][T10379] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 338.967894][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 338.977628][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 338.987312][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 338.997804][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.043553][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.057827][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.068189][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.078935][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.089085][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.099833][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.109977][T10379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.120729][T10379] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.134901][T10379] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 339.149866][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.160488][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.195109][T10379] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.204038][T10379] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.214501][T10379] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.223403][T10379] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.690582][ T1127] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 339.700139][ T1127] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 339.709087][ T5] Bluetooth: hci4: command 0x041b tx timeout [ 339.726624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 339.879176][ T1127] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 339.889673][ T1127] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 339.898909][ T8453] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:51:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:20 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000001880)=[{&(0x7f0000000780)="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", 0x110, 0xf0}]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0xff, 0xa, &(0x7f0000000440)=[{&(0x7f0000000080)="9ddec8a6296c681ca5c46288f3d6f569c819fee1a5cd22b9d1f001abc9270dfedf052825188e076ab5", 0x29, 0x9}, {&(0x7f00000018c0)="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", 0x1000, 0x7}, {&(0x7f00000028c0)="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", 0x1000, 0x3}, {&(0x7f00000000c0)="de4dfdcf957531067b718b4c1de5324674122351e5ccde05464c3689fb19064e10f0d5030e2ee95551afee7461207aeef7d3237a313097adeb35ef4b21ad40c78b42a9fbe10c8cc5ddcd42711625ec0a80441cce3d994bf6fa5c02a28492ff1bcd73d3029a9bce6b6f97e3df2790e9c0c427fae67b7d52ac239779275e7169b08e09f399d2dc17320a821c892591adb346647fb8532bcdd9ffc1bb4082", 0x9d, 0x200}, {&(0x7f0000000180)="1fe3e5", 0x3}, {&(0x7f00000001c0)="74302cbe319287fcc1d5832f7d3b0d3dd3c7e943f7ca71a72aa5182be62f911013c7ae322135e78848e6297fdc1e37d1db565b355f6e513fd451663035bb7380fd12c0eef5317861c6997bf742695062b0c3db086fcaae0e8f182a96ce30769ebd615b48c26df15051b46d9c", 0x6c, 0x5}, {&(0x7f0000000240)="00bc2d3674d23d46ca40f1cd56a3fdfe61e33854f25eace5d0b4764c0b8f591c03b1f23929dfaf7059f9609740eaa44ba34775d251f627a99dc02db0431fd1c2ff273c7cc446c8f3b8c57df37f14308a44b564e87038b214d2895fc5d3ba23122699a4ffcd14923842e29c11386d0a106a2b2b19b4e41c69b974758267344fc5943bbe524424da2e2a027fc84220b683857dbdcf09ab2601386a8a69a8f9ca543e055fd6", 0xa4, 0x907}, {&(0x7f0000000300)="7e4cec6dc2ced2cfd5f12c900e89eb6f82aa3ce2ef7abbd2d7360ca299aa63187ed7641d49e67c40a8b242e757b69fdfc1592f28c3f440c8b327fddaee38ab87", 0x40, 0x7}, {&(0x7f0000000340)="8bf6bd163d27a435ffa3efa12739e47ab18605c728754e43f72e6e4cf5b8909f8a894f7764cd578988a5c7d335d806845caa8c9a7f8d6d51d356d0da68f7cf360ed04f3a58affe768de774e119797c4ec38273c783f37325564223a8cb0642c2117c51eed2cbcc0370e93398729fb93a1f272676f2044dbd", 0x78, 0x4}, {&(0x7f00000003c0)="eb0204dd5aef22639c7b1705f177b7f0f781278d80de608002ac511e022d86b54da1277cb2bd019a96b5f3b81e214c293ea08f0528c8544b2dd0f3b1cfbc570bfae0a06ccdc8ff1905c034171fc984f5d855", 0x52, 0xfff}], 0x100001, &(0x7f00000004c0)={[{@rescan_uuid_tree='rescan_uuid_tree'}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@nodatasum='nodatasum'}, {@datasum='datasum'}, {@subvol={'subvol', 0x3d, '.,@-'}}], [{@fsname={'fsname'}}, {@subj_user={'subj_user', 0x3d, ',!'}}, {@context={'context', 0x3d, 'staff_u'}}]}) 15:51:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 340.730603][T10631] device vlan2 entered promiscuous mode [ 340.736374][T10631] device wlan1 entered promiscuous mode [ 340.780548][T10635] loop1: detected capacity change from 1 to 0 [ 340.849470][T10635] Dev loop1: unable to read RDB block 1 [ 340.855478][T10635] loop1: unable to read partition table [ 340.863862][T10631] device wlan1 left promiscuous mode [ 340.903494][T10635] loop1: partition table beyond EOD, truncated [ 340.910312][T10635] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 15:51:20 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:20 executing program 2: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 341.128014][T10635] loop1: detected capacity change from 1 to 0 15:51:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000500)={0x0, 0x8000}, 0x8) r1 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, &(0x7f0000000280)={0xc, &(0x7f0000000000)={0x20, 0x23, 0x33, {0x33, 0x1, "2e0fd1b2b3cfbaa83aa6e9b80050ca950498e7a97b90c360a870b68116a1c3380ca333a2dce9782e17f579bc80f9ee0380"}}, &(0x7f0000000540)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000004c0)={0x24, &(0x7f00000002c0)=ANY=[@ANYBLOB="000c370000000f044c4fc78a577033857b5407f846a35047ce35c947399865a2059d4fcfab5f3728ab14c84280efd84bedc2729f77675a90e333e79d4a"], &(0x7f0000000300)={0x0, 0xa, 0x1, 0xb8}, &(0x7f0000000340)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000380)={0x20, 0x80, 0x1c, {0x7, 0x8, 0x0, 0x1, 0x7, 0x0, 0x3, 0x3, 0x8001, 0x1, 0xfb4, 0xc9}}, &(0x7f00000003c0)={0x20, 0x85, 0x4, 0x1}, &(0x7f0000000400)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000440)={0x20, 0x87, 0x2, 0x7fff}, &(0x7f0000000480)={0x20, 0x89, 0x2}}) syz_usb_control_io$cdc_ncm(r1, 0x0, &(0x7f0000000580)={0x24, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x20, 0x80, 0x1c, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) [ 341.479409][T10646] device vlan2 entered promiscuous mode [ 341.485180][T10646] device wlan1 entered promiscuous mode [ 341.635747][T10646] device wlan1 left promiscuous mode [ 341.775612][ T5] Bluetooth: hci4: command 0x040f tx timeout 15:51:21 executing program 2: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:21 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 342.265076][ T4672] usb 2-1: new high-speed USB device number 18 using dummy_hcd 15:51:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:22 executing program 2: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:22 executing program 0: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 342.673077][ T4672] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 342.760873][T10668] device vlan2 entered promiscuous mode [ 342.766656][T10668] device wlan1 entered promiscuous mode [ 342.794130][T10668] device wlan1 left promiscuous mode [ 342.889306][ T4672] usb 2-1: New USB device found, idVendor=0525, idProduct=84a1, bcdDevice= 0.40 [ 342.899122][ T4672] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 342.907647][ T4672] usb 2-1: Product: syz [ 342.911930][ T4672] usb 2-1: Manufacturer: syz [ 342.916863][ T4672] usb 2-1: SerialNumber: syz 15:51:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 343.292131][T10675] device vlan2 entered promiscuous mode [ 343.297906][T10675] device wlan1 entered promiscuous mode 15:51:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 343.387750][T10675] device wlan1 left promiscuous mode [ 343.856876][ T5] Bluetooth: hci4: command 0x0419 tx timeout 15:51:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 344.180794][ T4672] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 344.189242][ T4672] cdc_ncm 2-1:1.0: dwNtbInMaxSize=0 is too small. Using 2048 [ 344.196959][ T4672] cdc_ncm 2-1:1.0: setting rx_max = 2048 15:51:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 344.403158][ T4672] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM, 42:42:42:42:42:42 [ 344.480997][ T4672] usb 2-1: USB disconnect, device number 18 [ 344.488607][ T4672] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM [ 344.608179][T10708] device vlan2 entered promiscuous mode [ 344.616057][T10708] device wlan1 entered promiscuous mode [ 344.633100][T10708] device wlan1 left promiscuous mode [ 345.050688][T10719] device vlan2 entered promiscuous mode [ 345.056557][T10719] device wlan1 entered promiscuous mode [ 345.192104][T10719] device wlan1 left promiscuous mode [ 345.480087][ T4672] usb 2-1: new high-speed USB device number 19 using dummy_hcd 15:51:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002800050ad25a802e8c63940d0424fc600c00184004ac0f000dac0f0037153e370a00038004000008d1bd", 0x33fe0}], 0x1}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x443000033) recvmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000000c0)=@caif, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/162, 0xa2}, {&(0x7f0000000000)=""/22, 0x16}, {&(0x7f0000000280)=""/235, 0xeb}], 0x3, &(0x7f0000000380)=""/74, 0x4a}, 0x60) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x101001) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000040)={0xfffffff3}, 0x28) r4 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe84, 0x800a9089) ioctl$USBDEVFS_FREE_STREAMS(r4, 0xc0105500, &(0x7f0000000040)=ANY=[@ANYBLOB="230100000100000400"]) ioctl$int_in(r4, 0x5421, &(0x7f00000004c0)=0xf2) 15:51:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:25 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000100)={0xd, @raw_data="056a31afbf8f821d0523055c8560d63010cf4884f27b0ed0bf9244619c4096e201016230bf925bb5595bff12fd3204c7478dd96721b9bd6d236c6515b3a4eb5ba91cec4a8d0b17d94a99cbb57d2100000000daae409179f0c499e15caf6b7436104b08e8c36ca856153e989da0fd9bb676ece88a0fe3f9940baf312918105c370de08c06dacc9c6a51519fa1d8f07cb27fab708cd705e76409a8e5ef0059a2df642cc209020035a5f00e000000000000000000000000000000f6f500"}) 15:51:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 346.300708][T10747] netlink: 207496 bytes leftover after parsing attributes in process `syz-executor.1'. 15:51:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 346.454254][T10753] device vlan2 entered promiscuous mode [ 346.462482][T10753] device wlan1 entered promiscuous mode [ 346.576939][T10753] device wlan1 left promiscuous mode 15:51:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'geneve1\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$cuse(0xffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) flock(r5, 0xc) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000010000104008128f473000000bf0eb609", @ANYRES32, @ANYBLOB="0000000000000400140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000019c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r2, @ANYBLOB="000000002000000408000a00", @ANYRES32], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x2c, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r2}, [@IFLA_ADDRESS={0xa, 0x1, @remote}]}, 0x2c}}, 0x0) 15:51:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r0 = openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x0, 0xb5, 0x60, @empty, @ipv4={[], [], @remote}, 0x40, 0x40, 0x1, 0x10001}}) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_TID={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8a}, [@jmp={0x5, 0x0, 0x9, 0x1, 0x7, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x5c}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x9, 0x1, 0x0, r0}, @generic={0x9, 0x9, 0x4, 0x5, 0xffffffa6}, @generic={0xff, 0x3, 0x3, 0x7, 0x6}, @alu={0x7, 0x1, 0x7, 0xa, 0x9, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x0, 0x9, 0x9, 0xfffffffffffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x2, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x6, 0xfffffffd, 0x6}, 0x10}, 0x74) 15:51:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 347.599343][T10776] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 347.647411][T10780] bridge1: port 1(geneve1) entered blocking state [ 347.654085][T10780] bridge1: port 1(geneve1) entered disabled state [ 347.663665][T10780] device geneve1 entered promiscuous mode [ 347.909890][T10782] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 15:51:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 348.024230][T10786] device vlan2 entered promiscuous mode [ 348.030226][T10786] device wlan1 entered promiscuous mode [ 348.181867][T10786] device wlan1 left promiscuous mode 15:51:27 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES16=r2], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r3}, 0x10) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 15:51:27 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r0 = openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x0, 0xb5, 0x60, @empty, @ipv4={[], [], @remote}, 0x40, 0x40, 0x1, 0x10001}}) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_TID={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8a}, [@jmp={0x5, 0x0, 0x9, 0x1, 0x7, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x5c}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x9, 0x1, 0x0, r0}, @generic={0x9, 0x9, 0x4, 0x5, 0xffffffa6}, @generic={0xff, 0x3, 0x3, 0x7, 0x6}, @alu={0x7, 0x1, 0x7, 0xa, 0x9, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x0, 0x9, 0x9, 0xfffffffffffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x2, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x6, 0xfffffffd, 0x6}, 0x10}, 0x74) 15:51:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r0 = openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x0, 0xb5, 0x60, @empty, @ipv4={[], [], @remote}, 0x40, 0x40, 0x1, 0x10001}}) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_TID={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8a}, [@jmp={0x5, 0x0, 0x9, 0x1, 0x7, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x5c}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x9, 0x1, 0x0, r0}, @generic={0x9, 0x9, 0x4, 0x5, 0xffffffa6}, @generic={0xff, 0x3, 0x3, 0x7, 0x6}, @alu={0x7, 0x1, 0x7, 0xa, 0x9, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x0, 0x9, 0x9, 0xfffffffffffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x2, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x6, 0xfffffffd, 0x6}, 0x10}, 0x74) 15:51:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES16=r2], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x10, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='ext4_mballoc_alloc\x00', r3}, 0x10) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) [ 349.504994][T10808] device vlan2 entered promiscuous mode [ 349.510659][T10808] device wlan1 entered promiscuous mode 15:51:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 349.646718][T10808] device wlan1 left promiscuous mode 15:51:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r0 = openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x0, 0xb5, 0x60, @empty, @ipv4={[], [], @remote}, 0x40, 0x40, 0x1, 0x10001}}) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_TID={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xf, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8a}, [@jmp={0x5, 0x0, 0x9, 0x1, 0x7, 0x100, 0x4}, @call={0x85, 0x0, 0x0, 0x5c}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, @map={0x18, 0x9, 0x1, 0x0, r0}, @generic={0x9, 0x9, 0x4, 0x5, 0xffffffa6}, @generic={0xff, 0x3, 0x3, 0x7, 0x6}, @alu={0x7, 0x1, 0x7, 0xa, 0x9, 0xfffffffffffffff4}, @ldst={0x0, 0x3, 0x0, 0x9, 0x9, 0xfffffffffffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000140)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x2, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x6, 0xfffffffd, 0x6}, 0x10}, 0x74) 15:51:29 executing program 4: syz_usb_connect$hid(0x477c6cf0bdd2912c, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x20e, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x0, 0x50, 0x73, [{{0x9, 0x4, 0x0, 0x8, 0x1, 0x3, 0x1, 0x3, 0x5, {0x9, 0x21, 0x5, 0x8, 0x1, {0x22, 0x4d5}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0xf7, 0x3f, 0x2}}, [{{0x9, 0x5, 0x2, 0x3, 0x3ff, 0x8, 0x3, 0x8}}]}}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x250, 0x6, 0x6, 0x6, 0xff, 0x80}, 0x1f8, &(0x7f0000000280)={0x5, 0xf, 0x1f8, 0x5, [@ptm_cap={0x3}, @generic={0xe4, 0x10, 0x4, "116c8a236a0cfdca84ebfd27467db1c799b86637bdf8eb4cc26f710bb7682423c402560b01f21c472e1b542b132a5ba8c271e631b0e78165a151b38ee4fd2db3c4ce97fc19324b1d68ed459b91f5c946ad40b4cfd91a77ec6c8b29d4d74833b78ceb12649a02cfa1b7ab3771fcb4597bb27daf2b6a05c5380bafa0f4198b124a12d6da3e677609c46d04b6a173f64056ef4fa4ca3d1602fd34b77d87f494e890764874cebe4b3523676a500524d442aaf9155d64a802c35527a8b24d948864b9666aad7bdc224670e534aa01b6ff8ee0fcec7a6c8d255863ded20653af7aa7d28e"}, @wireless={0xb, 0x10, 0x1, 0x4, 0x10, 0x6, 0x7f, 0x7fff, 0xf1}, @ssp_cap={0x24, 0x10, 0xa, 0x50, 0x6, 0x7, 0xf00, 0x200, [0xff0000, 0x30, 0xc05f, 0xffcf, 0xff0000, 0xd8]}, @generic={0xdd, 0x10, 0x4, "45583bd9fb69add599060a94d859866c12e0d4e2e13ed5156b8c83874cb8412340c95b2cf2b36fe69df2964d94add223e263b6f25d0e9ce8e3819220581589fdcbe977c8f6b04a27728da77f2e02285cc16b7ed455298c7483836721bda4dc22f1f43d1f4dc037894402e35cd867cc38e5c9da4bde9c32bef150505c5be15652f4f479ae8c0e10f77bf3fd76c7a8519385a84d571a5679fd966b618c17b85ade2a6e2b349c45b9ca310b915f1b6e9d3671219a9eeb8a88ee679791ea341cd7e25549f2e1c126faaedc4b6c1d99d70ee74fb1050e7c8e0b437c52"}]}, 0x2, [{0x49, &(0x7f0000000080)=@string={0x49, 0x3, "0c9461e2fbc907b3d53b214c28f57f58922937e63d00daf634b78c19746a90de708fb7659814a7c09c7c207a99dc53b79599834e0357116f478038bb7c5abe28bdc56eb8df0ff2"}}, {0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0xc09}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/226, 0xe2}], 0x1, 0x2f, 0x0) r1 = socket$netlink(0x10, 0x3, 0xb) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="940000001300290a000000000000000007000000", @ANYRES32=r3, @ANYBLOB="000000000000000008000c00004e07006c001a8054000a"], 0x94}}, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc04c5611, &(0x7f0000000640)={0x4, 0x9, 0x4, 0x4000, 0x80, {0x0, 0x2710}, {0x4, 0x0, 0x2, 0xcc, 0x5, 0x0, "92f4c8f9"}, 0x5, 0x1, @planes=&(0x7f0000000600)={0x7, 0x7f, @userptr=0xa00, 0xffffffff}, 0x1, 0x0, r0}) copy_file_range(r4, &(0x7f00000006c0)=0x2000200000000000, r0, &(0x7f0000000700)=0x6, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4010008}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=@deltclass={0x2c, 0x29, 0x200, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xe, 0xa}, {0xffff, 0x7}, {0xa, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x3f}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80c0}, 0x40) 15:51:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r0 = openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x0, 0xb5, 0x60, @empty, @ipv4={[], [], @remote}, 0x40, 0x40, 0x1, 0x10001}}) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x28, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_TID={0xc}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 15:51:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'ip6tnl0\x00', 0x0, 0x4, 0x9, 0x0, 0xb5, 0x60, @empty, @ipv4={[], [], @remote}, 0x40, 0x40, 0x1, 0x10001}}) 15:51:31 executing program 4: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000001c0)={0x0, 0xb, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bff57f2f"}, 0x0, 0x0, @userptr}) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}, {{{0x9, 0x5, 0x81, 0x3, 0x8}}}}}]}}]}}, 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000002c0)={0x24, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x22, 0x1, {[@main]}}, 0x0}, 0x0) syz_usb_control_io$hid(r1, &(0x7f00000006c0)={0x14, &(0x7f0000000540)={0x20, 0x3, 0x9, {0x9, 0xc, "9a35ec5e7b70ed"}}, &(0x7f0000000580)={0x0, 0x3, 0x95, @string={0x95, 0x3, "b0bb5b91777c691a6bd1f514fd9d60be01ebf17739b5b68b69c855c86a40d5b13037c4a2896beede11c08b8a435b7837214ac396151faca6848987dc09f6f40526332a6d78659ca7a3774f2c018031494e8850d743c4009917b495426b5ea1ee33c2dfb07d18a29cb3cb3c7c5980f39abf704f05794934589a70fc283286d56da42c5047a53901f565d6f8b4bdfede89f445b9"}}, &(0x7f0000000640)={0x0, 0x22, 0x17, {[@main=@item_4={0x3, 0x0, 0xc, "65556d12"}, @main=@item_012={0x0, 0x0, 0x9}, @local=@item_4={0x3, 0x2, 0x3, "29e6b183"}, @local=@item_012={0x0, 0x2, 0x9}, @main=@item_4={0x3, 0x0, 0x8, "5080836e"}, @local=@item_012={0x0, 0x2, 0xa}, @main=@item_4={0x3, 0x0, 0xa, "aec04dea"}]}}, &(0x7f0000000680)={0x0, 0x21, 0x9, {0x9, 0x21, 0x74, 0x2, 0x1, {0x22, 0x3ee}}}}, &(0x7f0000000840)={0x18, &(0x7f0000000700)={0x20, 0x16, 0x2a, "a4efa987c35a41021ea843362d1f3cb3f84494da998055271f516366d2bff920d1ebcd54b1dd2e327e86"}, &(0x7f0000000740)={0x0, 0xa, 0x1, 0x3b}, &(0x7f0000000780)={0x0, 0x8, 0x1, 0x6}, &(0x7f00000007c0)={0x20, 0x1, 0x2a, "16f9c00858091f8bcd6859beb63e471a5acd0e131181b50da52c88cb035eba68ee473a6be9ae69089cc2"}, &(0x7f0000000800)={0x20, 0x3, 0x1, 0xd3}}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0xc0189436, 0x0) syz_usb_ep_write(r1, 0x0, 0xb6, &(0x7f00000001c0)="9ae33c5fd8b0c0eac100b89d5246d4f3636253df0301cd07f8f19702f96de786513124f71b342b592600474eb4ad3430cdac1cd836d1f8254827dc7d30a7b8db8fcaf9f0c3f7f15d77c5b419d96603b142c1438ac11dd7aebf4f92797f8dbe582df5d8cd3b6bbd172995f177878c0b4b0f49b371032d394319f54ad3def476f07c5471b5fe37bbf0616f30b84f19bff9bc945b28da411afc304dc22bc22647aee995adff09ce13be31290fbbed4208bea064404a8847") r2 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="120100008ab76a08720c11004236000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r2, 0x0, &(0x7f00000003c0)={0x18, &(0x7f0000000200)={0x0, 0x0, 0xa, "589d24d3aa72912c1b4d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r2, &(0x7f0000000100)={0xc, &(0x7f0000000040)={0x40, 0x23, 0x2e, {0x2e, 0x21, "146a91f4aefc7242e972e549ded2e2ad4853153499e3a6981c196602b5399e02dd891fa0bfe993a5e9686f84"}}, &(0x7f0000000080)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xf0ff}}}, &(0x7f0000000500)={0x24, &(0x7f0000000300)={0x40, 0x1, 0x8e, "636d4f39b014c2e54005b70a8b06139ce850a192ffebb8b617ef7bf651b887d7099403c045d97c840b1e0c12527d0dda004e68cb96df5ea8cf292b4613fddeb38a9e0a029e15e8e78c745d3cc7184a64e09577aeab5e5aa25066704e4b308b53c8e5c8c048c318dded3334192ba425ac9a83b73fcb2308394a4ade1510e5f399ab649cd761c52794a7e3f3099230"}, &(0x7f0000000180)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000280)={0x0, 0x8, 0x1, 0x2}, &(0x7f00000003c0)={0x20, 0x81, 0x2, '~n'}, &(0x7f0000000400)={0x20, 0x82, 0x1, "cc"}, &(0x7f0000000440)={0x20, 0x83, 0x3, "e67580"}, &(0x7f0000000480)={0x20, 0x84, 0x1, "e3"}, &(0x7f00000004c0)={0x20, 0x85, 0x3, "ed2c7b"}}) 15:51:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) openat$zero(0xffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) 15:51:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 352.196515][ T1990] usb 5-1: new high-speed USB device number 2 using dummy_hcd 15:51:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 352.571739][ T1990] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 352.583076][ T1990] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 352.592749][ T1990] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 352.724094][ T1990] usb 5-1: config 0 descriptor?? 15:51:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 353.207661][ T1990] keytouch 0003:0926:3333.0001: fixing up Keytouch IEC report descriptor [ 353.280404][ T1990] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0001/input/input11 15:51:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 353.489082][ T1990] keytouch 0003:0926:3333.0001: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 354.131199][T10890] udc-core: couldn't find an available UDC or it's busy [ 354.141856][T10890] misc raw-gadget: fail, usb_gadget_probe_driver returned -16 [ 354.235554][ C0] Mem-Info: [ 354.239988][ C0] active_anon:272 inactive_anon:148430 isolated_anon:221 [ 354.239988][ C0] active_file:4794 inactive_file:55970 isolated_file:0 [ 354.239988][ C0] unevictable:768 dirty:85 writeback:0 [ 354.239988][ C0] slab_reclaimable:9387 slab_unreclaimable:18514 [ 354.239988][ C0] mapped:50913 shmem:6020 pagetables:1240 bounce:0 [ 354.239988][ C0] free:241267 free_pcp:1533 free_cma:0 [ 354.240283][ C0] Node 0 active_anon:1068kB inactive_anon:591464kB active_file:19012kB inactive_file:206940kB unevictable:1536kB isolated(anon):884kB isolated(file):0kB mapped:169112kB dirty:256kB writeback:0kB shmem:22004kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 518144kB writeback_tmp:0kB kernel_stack:4144kB pagetables:4232kB all_unreclaimable? no [ 354.240586][ C0] Node 1 active_anon:20kB inactive_anon:2256kB active_file:164kB inactive_file:16940kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:34540kB dirty:84kB writeback:0kB shmem:2076kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:160kB pagetables:728kB all_unreclaimable? no [ 354.240929][ C0] Node 0 DMA free:4096kB min:160kB low:200kB high:240kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:4096kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 354.241245][ C0] lowmem_reserve[]: 0 900 1212 1212 1212 [ 354.241432][ C0] Node 0 DMA32 free:39280kB min:36076kB low:45092kB high:54108kB reserved_highatomic:0KB active_anon:88kB inactive_anon:507568kB active_file:732kB inactive_file:158056kB unevictable:0kB writepending:168kB present:3129332kB managed:930628kB mlocked:0kB bounce:0kB free_pcp:2904kB local_pcp:1496kB free_cma:0kB [ 354.241752][ C0] lowmem_reserve[]: 0 0 312 312 312 [ 354.241935][ C0] Node 0 Normal free:16068kB min:12504kB low:15628kB high:18752kB reserved_highatomic:0KB active_anon:980kB inactive_anon:83932kB active_file:18280kB inactive_file:48884kB unevictable:1536kB writepending:88kB present:1048576kB managed:319488kB mlocked:0kB bounce:0kB free_pcp:656kB local_pcp:344kB free_cma:0kB [ 354.434401][ C0] lowmem_reserve[]: 0 0 0 0 0 [ 354.434401][ C0] Node 1 Normal free:905624kB min:41364kB low:51704kB high:62044kB reserved_highatomic:0KB active_anon:20kB inactive_anon:2256kB active_file:164kB inactive_file:16940kB unevictable:1536kB writepending:84kB present:4194304kB managed:1056768kB mlocked:0kB bounce:0kB free_pcp:2572kB local_pcp:1460kB free_cma:0kB [ 354.434401][ C0] lowmem_reserve[]: 0 0 0 0 0 [ 354.434401][ C0] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (M) = 4096kB [ 354.434401][ C0] Node 0 DMA32: 448*4kB (UM) 252*8kB (UME) 146*16kB (UME) 87*32kB (UME) 47*64kB (ME) 8*128kB (UME) 1*256kB (U) 3*512kB (UME) 2*1024kB (ME) 1*2048kB (M) 5*4096kB (M) = 39328kB [ 354.434401][ C0] Node 0 Normal: 110*4kB (UME) 105*8kB (UME) 63*16kB (UME) 17*32kB (UME) 7*64kB (UME) 16*128kB (UE) 14*256kB (U) 10*512kB (UE) 2*1024kB (U) 0*2048kB 0*4096kB = 16080kB [ 354.434401][ C0] Node 1 Normal: 42*4kB (UME) 10*8kB (UE) 8*16kB (UME) 7*32kB (UME) 5*64kB (UME) 2*128kB (UM) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 220*4096kB (M) = 905624kB [ 354.434401][ C0] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 354.434401][ C0] Node 0 hugepages_total=1 hugepages_free=0 hugepages_surp=1 hugepages_size=2048kB [ 354.434401][ C0] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 354.434401][ C0] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 354.434401][ C0] 50710 total pagecache pages [ 354.434401][ C0] 0 pages in swap cache [ 354.434401][ C0] Swap cache stats: add 0, delete 0, find 0/0 [ 354.434401][ C0] Free swap = 0kB [ 354.434401][ C0] Total swap = 0kB [ 354.434401][ C0] 2097051 pages RAM [ 354.434401][ C0] 0 pages HighMem/MovableOnly [ 354.434401][ C0] 1519306 pages reserved [ 354.434401][ C0] 0 pages cma reserved 15:51:35 executing program 4: r0 = fsopen(&(0x7f0000000a40)='squashfs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000000)='+\\.\\,:\\\x00', 0x0, 0xffffffffffffffff) 15:51:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:35 executing program 5: r0 = dup(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, 0xffffffffffffffff], 0x6) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080)=@gcm_256={{0x303}, "7eb4659c97adacb0", "c80ef3c11e5ad9729bead187113a58815e2ba65f4b017297d338affdf7e57650", "924b5ae2", "e0a999e923bc8b11"}, 0x38) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/65, 0x41}, {&(0x7f0000000140)=""/204, 0xcc}, {&(0x7f0000000240)=""/178, 0xb2}, {&(0x7f0000000300)=""/25, 0x19}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000440)=""/136, 0x88}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000600)=""/82, 0x52}, {&(0x7f0000000680)=""/98, 0x62}, {&(0x7f0000000700)=""/129, 0x81}], 0xa) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000840)=""/108, 0x6c}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/60, 0x3c}], 0x3) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'wg2\x00'}) r2 = openat$vcs(0xffffff9c, &(0x7f0000001980)='/dev/vcs\x00', 0x4000, 0x0) r3 = openat$6lowpan_control(0xffffff9c, &(0x7f00000019c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc04c560f, &(0x7f0000001a40)={0x6, 0x9, 0x4, 0x100000, 0x8, {0x77359400}, {0x5, 0x0, 0x0, 0x5, 0x6, 0x4, "56dc029c"}, 0x2, 0x3, @planes=&(0x7f0000001a00)={0x401, 0x9, @mem_offset=0x2, 0x2}, 0x8, 0x0, r0}) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000001ac0)=[r3, r0, r4], 0x3) r5 = socket$xdp(0x2c, 0x3, 0x0) signalfd(r5, &(0x7f0000001b00)={[0x401, 0x1]}, 0x8) r6 = openat2(r0, &(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)={0x80500, 0x40}, 0x18) sendmsg$nl_route(r6, &(0x7f0000001c80)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001c40)={&(0x7f0000001c00)=@ipv6_getrule={0x1c, 0x22, 0x800, 0x70bd2c, 0x25dfdbfe, {0xa, 0x80, 0x10, 0x2, 0x5, 0x0, 0x0, 0x8, 0x8000}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40084}, 0x44004) fchdir(r2) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f0000001dc0)=[r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) 15:51:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 355.726064][ T8453] usb 5-1: USB disconnect, device number 2 15:51:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 15:51:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:36 executing program 4: io_setup(0x7ff, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000001340)=[0x0]) 15:51:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:36 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 359.368280][T10948] IPVS: ftp: loaded support on port[0] = 21 [ 360.362580][T10948] chnl_net:caif_netlink_parms(): no params data found [ 360.535048][T10948] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.542941][T10948] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.552852][T10948] device bridge_slave_0 entered promiscuous mode [ 360.570202][T10948] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.577711][T10948] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.589909][T10948] device bridge_slave_1 entered promiscuous mode [ 360.705323][T10948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 360.722075][T10948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 360.766121][T10948] team0: Port device team_slave_0 added [ 360.777390][T10948] team0: Port device team_slave_1 added [ 360.816881][T10948] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 360.824065][T10948] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 360.851915][T10948] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 360.867543][T10948] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 360.875518][T10948] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 360.904115][T10948] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 360.957832][T10948] device hsr_slave_0 entered promiscuous mode [ 360.966710][T10948] device hsr_slave_1 entered promiscuous mode [ 360.974135][T10948] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 360.982094][T10948] Cannot create hsr debugfs directory [ 361.189127][ T4672] Bluetooth: hci5: command 0x0409 tx timeout [ 361.209308][T10948] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 361.222470][T10948] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 361.240680][T10948] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 361.259391][T10948] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 361.492848][T10948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.528617][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.537975][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.558722][T10948] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.573593][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.584871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.593867][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.601414][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.617405][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.634257][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.644684][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.654059][ T4672] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.661605][ T4672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.684948][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.708738][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.733950][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.744150][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.755411][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.775607][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.788754][ T8807] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.820335][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.829644][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.850816][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.860824][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.879300][T10948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.923389][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.932614][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.960165][T10948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.082130][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.092327][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.141600][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 362.151448][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.162345][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.172558][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.192681][T10948] device veth0_vlan entered promiscuous mode [ 362.218019][T10948] device veth1_vlan entered promiscuous mode [ 362.278972][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 362.288695][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 362.298212][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 362.308254][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 362.333716][T10948] device veth0_macvtap entered promiscuous mode [ 362.348529][ T1990] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 362.368306][T10948] device veth1_macvtap entered promiscuous mode [ 362.409129][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 362.420953][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.433444][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 362.445147][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.455259][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 362.465979][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.476099][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 362.486806][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.497194][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 362.507906][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.521016][T10948] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 362.529554][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 362.539983][ T1988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 362.571614][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 362.582835][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.593712][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 362.604543][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.614908][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 362.626091][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.637391][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 362.648834][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.658945][T10948] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 362.669851][T10948] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 362.682351][T10948] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 362.694678][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 362.704946][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.728990][T10948] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.741108][T10948] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.751217][T10948] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.760487][T10948] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.105012][ T670] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 363.112955][ T670] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 363.127862][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 363.221308][ T55] Bluetooth: hci5: command 0x041b tx timeout [ 363.258465][ T23] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 363.266713][ T23] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 363.279836][ T55] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 15:51:43 executing program 5: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000000)) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x8a01, 0x0) r0 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000380)) 15:51:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:43 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x40200, 0x0) 15:51:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 363.809704][T11213] device vlan2 entered promiscuous mode [ 363.815970][T11213] device macsec0 entered promiscuous mode 15:51:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 363.933547][T11213] device macsec0 left promiscuous mode 15:51:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:43 executing program 4: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x0) 15:51:43 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:44 executing program 3: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 365.306646][ T1988] Bluetooth: hci5: command 0x040f tx timeout [ 365.429289][T11236] device vlan2 entered promiscuous mode [ 365.435226][T11236] device macsec0 entered promiscuous mode 15:51:45 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r2, &(0x7f0000001480)=[{0x0}, {&(0x7f0000003400)=""/4096, 0x1000}], 0x2, 0x0, 0x0) 15:51:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:45 executing program 4: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000000)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x125601, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x8a01, 0x0) [ 365.482839][T11236] device macsec0 left promiscuous mode 15:51:45 executing program 3: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:45 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 366.210896][T11245] device vlan2 entered promiscuous mode [ 366.216826][T11245] device macsec0 entered promiscuous mode [ 366.341076][T11245] device macsec0 left promiscuous mode 15:51:46 executing program 3: r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)={0x1c, 0x1, 0x4, 0x301, 0x0, 0x0, {0xa}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 15:51:46 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 367.376426][ T55] Bluetooth: hci5: command 0x0419 tx timeout 15:51:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 367.728407][T11270] device vlan2 entered promiscuous mode [ 367.734077][T11270] device macsec0 entered promiscuous mode [ 367.802306][T11270] device macsec0 left promiscuous mode [ 368.241016][T11274] device vlan2 entered promiscuous mode [ 368.246847][T11274] device macsec0 entered promiscuous mode [ 368.351781][T11274] device macsec0 left promiscuous mode [ 368.577237][ T7] Bluetooth: hci0: command 0x0406 tx timeout 15:51:48 executing program 5: syz_emit_ethernet(0xe, &(0x7f0000000040)={@local, @random="2b2e6e02ef51", @val, {@generic={0x8035}}}, 0x0) 15:51:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x40086602, 0x0) 15:51:48 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 369.577151][T11296] device vlan2 entered promiscuous mode [ 369.582840][T11296] device macsec0 entered promiscuous mode [ 369.680849][T11296] device macsec0 left promiscuous mode 15:51:49 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8947, &(0x7f0000000480)={'wpan4\x00'}) 15:51:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 370.200947][T11297] device vlan2 entered promiscuous mode [ 370.207111][T11297] device vlan1 entered promiscuous mode [ 370.304156][T11297] device vlan1 left promiscuous mode 15:51:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5, 0x0, 0x0, 0x7, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002940)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002200)=""/246, 0xf6}}], 0x1, 0x0, 0x0) pipe(0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2) write(r3, &(0x7f0000000340), 0x41395527) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x80c00) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000007c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000002a00)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x80000, 0x0) 15:51:50 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xd, 0x0, &(0x7f00000002c0)=0x4) 15:51:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x1c) fcntl$setstatus(r2, 0x4, 0x6100) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x87ffffc) r4 = memfd_create(&(0x7f0000000940)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QUw!j\x91\x0eW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1\xb04A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', r0) 15:51:52 executing program 4: r0 = syz_open_dev$binderN(&(0x7f00000032c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x14, 0x0, &(0x7f0000000080)=[@increfs_done], 0x0, 0x0, 0x0}) 15:51:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:52 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0x0, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:52 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x100060, 0xa808) [ 373.547633][T11373] device vlan2 entered promiscuous mode [ 373.553324][T11373] device vlan1 entered promiscuous mode [ 373.690968][T11373] device vlan1 left promiscuous mode 15:51:53 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:53 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd601f28ae0008000300000000000000000000000000000000fe80"], 0x0) 15:51:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@meta='meta'}, {@localcaching='localcaching'}], [{@uid_gt={'uid>'}}]}) [ 374.545969][T11378] device vlan2 entered promiscuous mode [ 374.551639][T11378] device vlan1 entered promiscuous mode 15:51:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 374.636324][T11378] device vlan1 left promiscuous mode 15:51:54 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="03"], 0xaf, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/85}, 0x5d, 0x0, 0x1800) [ 374.886503][T11396] gfs2: Unknown parameter 'uid>00000000000000000000' [ 374.979514][T11396] gfs2: Unknown parameter 'uid>00000000000000000000' 15:51:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x0, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:54 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x40, 0x0, 0x8) 15:51:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:54 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:55 executing program 4: msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) [ 375.736040][T11416] device vlan2 entered promiscuous mode [ 375.741865][T11416] device vlan1 entered promiscuous mode [ 375.915487][T11416] device vlan1 left promiscuous mode 15:51:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:55 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, 0x0, 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:55 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002880)={'sit0\x00', 0x0}) 15:51:56 executing program 4: syz_mount_image$ufs(&(0x7f0000000800)='ufs\x00', 0x0, 0x0, 0x1, &(0x7f0000000940)=[{&(0x7f0000000880)="392e87d7bf9409baedf8db27faefe3d52a7555d00d0e41a025039a8c700e07d8b20ec0f460803b90315c8e30abe8633099bf774cb4e197ffdbc07cffb3723b8465ea48183d5c934fe65d7440da91", 0x4e, 0x5}], 0x2200000, &(0x7f0000000980)={[{'\':#)($'}]}) [ 376.578739][T11417] device vlan2 entered promiscuous mode 15:51:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, 0x0, 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001240)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x1}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004044}, 0x4000001) r4 = dup(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x3, 0x5, &(0x7f0000000ac0)=@raw=[@ldst={0x0, 0x2, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffffffffff0}, @map={0x18, 0xb, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9}], &(0x7f0000000b00)='syzkaller\x00', 0x8, 0x99, &(0x7f0000001840)=""/153, 0x41000, 0x8, [], 0x0, 0x1e, r3, 0x8, &(0x7f0000000b40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000bc0)={0x1, 0x6, 0x2813, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) r5 = fcntl$dupfd(r2, 0x0, r3) syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0xe1565aa0e5197776) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYRESDEC=r2, @ANYRESOCT], 0x30}, 0x1, 0x0, 0x0, 0x54}, 0x4840) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000632f77fbac14140ee9", 0x0, 0x102, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 15:51:56 executing program 4: ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, &(0x7f0000000000)={0x8, 0x3f, 0x1, 0x4, 0x2}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x260, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x87d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4dd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8a}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x782}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb423}]}]}, @TIPC_NLA_NODE={0xd4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "a9fb45ba40001ab0e0a040fe6f339af3d568b20d16c0dd404bca0d2952b2b7eb"}}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "630227f1fb116f50630ea46bea9306817439796d90ea9a388d64f5"}}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "cbe29d3cc2d1f01638f2946e3d94a3aac04ece0038c11b37f7db"}}]}, @TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf0d1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}]}, 0x260}, 0x1, 0x0, 0x0, 0x44080}, 0x841) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000380)=0x4) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f00000003c0)=0x20) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000400)='/dev/rtc#\x00', 0x94c, 0x2) ioctl$RTC_AIE_ON(r1, 0x7001) r2 = openat$full(0xffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x200, 0x0) sendmsg$AUDIT_TTY_GET(r2, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x10, 0x3f8, 0x300, 0x70bd25, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x14}, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x320, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x127}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x12d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'eth', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @private2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x3f, @loopback, 0x4}}}}]}, @TIPC_NLA_LINK={0x8c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x49}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x506}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x16}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd2720d3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffc00}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff7}]}, @TIPC_NLA_BEARER={0x10, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_SOCK={0xc4, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7dde5f2e}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8000}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xf8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x200}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x320}, 0x1, 0x0, 0x0, 0x40000}, 0x41) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000a40)={[{0xe92, 0x8, 0x7, 0xfa, 0x80, 0x40, 0x81, 0x3, 0x4, 0x4, 0xf7, 0x1f, 0x4}, {0x810, 0xffff, 0x5, 0x5, 0xc, 0x81, 0x20, 0x2, 0x5, 0x5, 0x4, 0x6, 0x8}, {0x20, 0x6, 0xff, 0x62, 0x40, 0x8, 0x4, 0x40, 0x4, 0x1, 0x8, 0x0, 0x24}], 0x2}) mkdirat$cgroup_root(0xffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz0\x00', 0x1ff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000b00)='TIPCv2\x00', r2) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)={0x54, 0x0, 0x400, 0x70bd26, 0x25dfdbff, {}, [@ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0x8}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x200}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x3f}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8, 0x8, 0xd90}, @ETHTOOL_A_CHANNELS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x5}]}, 0x54}}, 0x400) [ 377.299594][T11450] device vlan2 entered promiscuous mode [ 377.497242][T11458] device vlan2 entered promiscuous mode 15:51:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, 0x0, 0x2, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 378.156563][T11471] device vlan2 entered promiscuous mode 15:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 378.394980][T11480] device vlan2 entered promiscuous mode 15:51:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000002c0)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) 15:51:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:58 executing program 5: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="d2"], 0xaf, 0x0) 15:51:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 379.110972][T11495] device vlan2 entered promiscuous mode [ 379.116853][T11495] device macsec0 entered promiscuous mode [ 379.185557][T11495] device macsec0 left promiscuous mode 15:51:58 executing program 4: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) 15:51:59 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x2e1c6f4659365fb7, 0x0) fcntl$lock(r0, 0x25, 0x0) [ 379.827918][T11499] device vlan2 entered promiscuous mode 15:51:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0xdc, &(0x7f0000000340)=""/220, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:51:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000088cff6)='/dev/ptmx\x00', 0x1000000000001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b3fdc)) write(r0, &(0x7f000054bfba)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) r1 = syz_open_pts(r0, 0x2) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="10", 0x1}], 0x1) 15:51:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:51:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:00 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000340)}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x2ffff, 0x0) 15:52:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 380.656101][T11522] device vlan2 entered promiscuous mode [ 380.664305][T11522] device macsec0 entered promiscuous mode [ 380.768206][T11522] device macsec0 left promiscuous mode 15:52:00 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKBSZGET(r0, 0x1263, &(0x7f0000000040)) 15:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 381.510720][T11528] device vlan2 entered promiscuous mode [ 381.516592][T11528] device macsec0 entered promiscuous mode 15:52:01 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) [ 381.598927][T11528] device macsec0 left promiscuous mode 15:52:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x2, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x8, 0x8, 0x0, "e0"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}]}, 0x60}}, 0x0) 15:52:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:01 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x4, 0x0, 0xb, 0xa}]}, &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 15:52:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80800) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x41, 0xfffffffffffffff7) fanotify_init(0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) [ 382.580768][T11554] device vlan2 entered promiscuous mode [ 382.586575][T11554] device macsec0 entered promiscuous mode [ 382.660205][T11554] device macsec0 left promiscuous mode [ 382.815527][T11567] uffd: Set unprivileged_userfaultfd sysctl knob to 1 if kernel faults must be handled without obtaining CAP_SYS_PTRACE capability 15:52:02 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @broadcast, @val, {@ipv4}}, 0x0) 15:52:02 executing program 1: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) getdents(r0, &(0x7f0000000100)=""/150, 0x96) 15:52:02 executing program 4: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@phonet, 0x80) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socketpair(0x22, 0x0, 0x8, &(0x7f00000009c0)) syz_genetlink_get_family_id$mptcp(&(0x7f0000000a40)='mptcp_pm\x00', 0xffffffffffffffff) [ 383.259993][T11566] device vlan2 entered promiscuous mode [ 383.265970][T11566] device macsec0 entered promiscuous mode 15:52:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 383.353125][T11566] device macsec0 left promiscuous mode [ 383.578281][T11576] loop1: detected capacity change from 264192 to 0 15:52:03 executing program 4: r0 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 15:52:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 383.940088][ T8807] Bluetooth: hci1: command 0x0406 tx timeout 15:52:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:03 executing program 5: openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000000a40)=""/57, 0x39}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x26) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x275a, 0x0) preadv(r1, &(0x7f00000012c0), 0x1000000000000147, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 384.435183][T11595] device vlan2 entered promiscuous mode [ 384.441723][T11595] device macsec0 entered promiscuous mode 15:52:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 384.475547][T11595] device macsec0 left promiscuous mode 15:52:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000480)={0x0, 0x6, {0x10000, @usage, 0x0, 0x7cd1, 0x0, 0x0, 0xf8bc, 0x7ff, 0x0, @usage=0x7, 0x0, 0x0, [0x6, 0xfff, 0x401, 0x0, 0x8]}, {0x0, @usage, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x6, 0x0, @struct={0x4, 0x3}, 0x0, 0x3, [0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x81]}, {0x100, @usage, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x91, @struct={0x0, 0x200}, 0x4, 0x0, [0xff, 0x0, 0xa2, 0x0, 0x87, 0x101]}, {0x0, 0x22, 0x2}}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = signalfd4(r2, &(0x7f0000000340)={[0x6]}, 0x8, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000012000/0x18000)=nil, &(0x7f00000003c0)=[@text32={0x20, &(0x7f0000000380)="66b823010f00d8f08221cb3e2e26660f1c02db3fc4e191f6950d00000066ba6100edc4e1fa106100f30f09640f6bc8b9800000c00f3235000400000f30", 0x3d}], 0x1, 0x44, &(0x7f0000000400)=[@dstype0={0x6, 0xe}], 0x1) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="bd7300fddbff6f7febaf8e001eb68afffaffff07000113e30000000052c40000"], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x20000804) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x10000020000000fe, 0x0, 0x0, 0x0, 0x4, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x100000, 0x200400}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc01cf509, &(0x7f00000002c0)={r4, 0x4, 0x6, 0x9}) 15:52:04 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) syz_mount_image$ufs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x2200000, &(0x7f0000000980)) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) 15:52:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:06 executing program 1: syz_mount_image$ufs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000940)=[{&(0x7f0000000880)='9', 0x1, 0x5}], 0x0, 0x0) 15:52:06 executing program 4: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000003080)={'ip6tnl0\x00', 0x0}) 15:52:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:06 executing program 5: recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ufs(&(0x7f0000000800)='ufs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)) socketpair(0x0, 0x4, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x0) [ 386.966616][T11641] device vlan2 entered promiscuous mode [ 386.972274][T11641] device macsec0 entered promiscuous mode [ 386.986673][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 386.993249][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 [ 387.065919][T11643] ufs: ufs was compiled with read-only support, can't be mounted as read-write 15:52:06 executing program 4: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r0, 0x400000010000, 0x0) [ 387.132244][T11641] device macsec0 left promiscuous mode 15:52:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x41, 0xfffffffffffffff7) fanotify_init(0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) 15:52:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:07 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f00000002c0)=@usbdevfs_driver={0x0, 0x10000, 0x0}) 15:52:07 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0x9) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) set_mempolicy(0x3, &(0x7f00000002c0)=0x2f1, 0x7f) 15:52:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r3, 0x1c) fcntl$setstatus(r2, 0x4, 0x6100) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x87ffffc) r4 = memfd_create(&(0x7f0000000940)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QUw!j\x91\x0eW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1\xb04A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 388.629313][T11679] device vlan2 entered promiscuous mode [ 388.635547][T11679] device macsec0 entered promiscuous mode 15:52:08 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, 0x0) 15:52:08 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x7) [ 388.742850][T11679] device macsec0 left promiscuous mode 15:52:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)) 15:52:09 executing program 1: syz_mount_image$qnx6(&(0x7f0000000040)='qnx6\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[], [{@fowner_eq={'fowner', 0x3d, 0xee01}}]}) 15:52:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)) [ 390.239742][T11709] qnx6: invalid mount options. [ 390.481336][T11715] device vlan2 entered promiscuous mode [ 390.487595][T11715] device macsec0 entered promiscuous mode 15:52:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 390.698277][T11715] device macsec0 left promiscuous mode 15:52:10 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0xffffffff}, 0x0, 0x0) 15:52:10 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 15:52:10 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/kvm\x00', 0xe02, 0x0) 15:52:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:11 executing program 1: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:52:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}]}, 0x60}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 15:52:11 executing program 5: unshare(0x4000400) r0 = socket(0x10, 0x2, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) [ 392.290995][T11742] device vlan2 entered promiscuous mode [ 392.298637][T11742] device vlan1 entered promiscuous mode 15:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 392.429452][T11742] device vlan1 left promiscuous mode 15:52:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 15:52:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}]}, 0x60}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 15:52:12 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000100), 0x2001000, &(0x7f00000004c0)=ANY=[]) 15:52:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}]}, 0x60}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) [ 393.708737][T11777] device vlan2 entered promiscuous mode [ 393.715954][T11777] device vlan1 entered promiscuous mode [ 393.825347][T11777] device vlan1 left promiscuous mode 15:52:13 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) close(r0) 15:52:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 15:52:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_REVISION={0x5}]}, 0x60}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) 15:52:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x38, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x38}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)={0x0, 0x0, 0x1, 0x0, 0x0, [{}]}) 15:52:14 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r0, 0x0, 0x0, 0x80) [ 395.362293][T11796] device vlan2 entered promiscuous mode [ 395.368486][T11796] device wlan1 entered promiscuous mode [ 395.484682][T11796] device wlan1 left promiscuous mode 15:52:15 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_aout(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1020) 15:52:15 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) [ 396.069259][T11802] device vlan2 entered promiscuous mode [ 396.075068][T11802] device vlan1 entered promiscuous mode 15:52:15 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5603, &(0x7f0000000000)) [ 396.168793][T11802] device vlan1 left promiscuous mode 15:52:16 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 396.745988][T11803] device vlan2 entered promiscuous mode [ 396.751747][T11803] device wlan1 entered promiscuous mode [ 396.810572][T11803] device wlan1 left promiscuous mode 15:52:16 executing program 4: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x0) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) close(r0) 15:52:17 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/229, 0xe5}], 0x1, 0x0, 0x0) 15:52:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:17 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) [ 397.951730][T11849] device vlan2 entered promiscuous mode [ 397.957569][T11849] device wlan1 entered promiscuous mode [ 398.013772][T11849] device wlan1 left promiscuous mode 15:52:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x24000804, &(0x7f00000005c0)={0x2, 0x0, @loopback}, 0x10) 15:52:17 executing program 4: unshare(0x4000400) r0 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000000c0)={0x0, 0x47, &(0x7f0000000040)={0x0}}, 0x0) [ 398.701166][T11852] device vlan2 entered promiscuous mode [ 398.707871][T11852] device wlan1 entered promiscuous mode [ 398.758488][T11852] device wlan1 left promiscuous mode 15:52:18 executing program 4: socket(0x0, 0x0, 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080), &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f00000001c0)={'crc32c-generic\x00'}}) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) 15:52:18 executing program 5: syz_mount_image$ufs(&(0x7f0000000800)='ufs\x00', 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000980)) 15:52:18 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000400)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab08) ioctl$BLKBSZGET(r0, 0x40081271, &(0x7f0000000040)) [ 399.303188][ T8453] Bluetooth: hci2: command 0x0406 tx timeout [ 399.336588][T11856] device vlan2 entered promiscuous mode [ 399.425391][T11878] block nbd1: NBD_DISCONNECT [ 399.496167][T11878] block nbd1: NBD_DISCONNECT 15:52:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:19 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/cgroups\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') sendfile(r1, r0, 0x0, 0x962f) 15:52:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000100)="1400000052004f7fb3e4bf80a000080000000000", 0x14) recvmmsg(r0, &(0x7f0000005c80)=[{{0x0, 0xad, 0x0}}], 0x344, 0x10122, 0x0) 15:52:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000014c0)) [ 400.186869][T11898] device vlan2 entered promiscuous mode [ 400.192592][T11898] device wlan1 entered promiscuous mode [ 400.213807][T11898] device wlan1 left promiscuous mode 15:52:20 executing program 5: userfaultfd(0x180000) 15:52:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000980)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000940)={0x0}}, 0x0) [ 400.960739][T11899] device vlan2 entered promiscuous mode [ 400.966600][T11899] device wlan1 entered promiscuous mode [ 401.024912][T11899] device wlan1 left promiscuous mode 15:52:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000003640)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x68}}, 0x0) 15:52:21 executing program 5: syz_mount_image$ufs(0x0, &(0x7f0000000840)='./file0\x00', 0x80000001, 0x1, &(0x7f0000000940)=[{&(0x7f0000000880)='9', 0x1, 0x5}], 0x0, &(0x7f0000000980)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'veth0_vlan\x00'}}]}) [ 401.399130][T11902] device vlan2 entered promiscuous mode 15:52:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x34}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000340)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, 0x0, 0x0) [ 401.912640][T11933] loop5: detected capacity change from 264192 to 0 15:52:21 executing program 1: syz_mount_image$ufs(0x0, &(0x7f0000000840)='./file0\x00', 0x80000001, 0x1, &(0x7f0000000940)=[{&(0x7f0000000880)='9', 0x1, 0x5}], 0x2200000, &(0x7f0000000980)={[{'\':#)($'}]}) [ 402.081824][T11933] loop5: detected capacity change from 264192 to 0 [ 402.129423][T11938] device vlan2 entered promiscuous mode [ 402.135251][T11938] device wlan1 entered promiscuous mode [ 402.306371][T11951] loop4: detected capacity change from 264192 to 0 [ 402.475697][T11938] device wlan1 left promiscuous mode 15:52:22 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_persistent(0x16, 0x0, r0) [ 402.930776][T11957] loop1: detected capacity change from 264192 to 0 [ 403.054244][T11954] device vlan2 entered promiscuous mode [ 403.060160][T11954] device wlan1 entered promiscuous mode [ 403.137509][T11954] device wlan1 left promiscuous mode 15:52:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00', r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="01000000000000000000010000000800020002000000080001000000000018000c8014000b8008000a0000000000080009004cb6dd7b48000c8044000b8008000a00bebe000008000a00ac61000008000a00d7f8000008000a002197000008000a00cde80000080009000afe9e6808000a00535b000008000a00834600003c0004"], 0xc0}}, 0x0) 15:52:23 executing program 4: syz_mount_image$ufs(0x0, &(0x7f0000000840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)) 15:52:23 executing program 5: syz_mount_image$gfs2(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000540)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='v7\x00', 0x0, 0x0) [ 403.732827][T11973] device vlan2 entered promiscuous mode [ 403.738715][T11973] device macsec0 entered promiscuous mode 15:52:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 403.893683][T11977] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. [ 403.917508][T11973] device macsec0 left promiscuous mode 15:52:23 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f0000000a40)='mptcp_pm\x00', 0xffffffffffffffff) [ 404.336941][T11985] device vlan2 entered promiscuous mode [ 404.342620][T11985] device wlan1 entered promiscuous mode [ 404.398759][T11985] device wlan1 left promiscuous mode 15:52:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5460, &(0x7f0000000340)) [ 405.078194][T11988] device vlan2 entered promiscuous mode [ 405.083861][T11988] device wlan1 entered promiscuous mode [ 405.117467][T11988] device wlan1 left promiscuous mode 15:52:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r1, &(0x7f00000021c0)="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", 0x2000, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r1, &(0x7f00000041c0)="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", 0x2000, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x4}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) dup3(r0, r1, 0x0) 15:52:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) splice(r3, 0x0, r4, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 405.859624][T12012] device vlan2 entered promiscuous mode [ 405.866069][T12012] device wlan1 entered promiscuous mode [ 405.916301][T12012] device wlan1 left promiscuous mode [ 406.239907][T12011] device vlan2 entered promiscuous mode [ 406.245721][T12011] device macsec0 entered promiscuous mode [ 406.279420][T12011] device macsec0 left promiscuous mode [ 406.723936][T12016] device vlan2 entered promiscuous mode [ 406.729794][T12016] device wlan1 entered promiscuous mode [ 406.782294][T12016] device wlan1 left promiscuous mode [ 406.950263][ T2825] block nbd5: Attempted send on invalid socket [ 406.956961][ T2825] print_req_error: 2 callbacks suppressed [ 406.957019][ T2825] blk_update_request: I/O error, dev nbd5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 15:52:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 407.015627][T11983] VFS: unable to read V7 FS superblock on device nbd5. [ 407.022831][T11983] VFS: could not find a valid V7 on nbd5. 15:52:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x40, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 407.790168][T12038] device vlan2 entered promiscuous mode [ 407.798906][T12038] device wlan1 entered promiscuous mode [ 407.945000][T12038] device wlan1 left promiscuous mode 15:52:27 executing program 4: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 15:52:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:27 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) 15:52:27 executing program 5: sched_rr_get_interval(0x0, &(0x7f00000010c0)) [ 408.417476][T12039] device vlan2 entered promiscuous mode [ 408.423263][T12039] device macsec0 entered promiscuous mode [ 408.533229][T12039] device macsec0 left promiscuous mode 15:52:28 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) 15:52:28 executing program 5: sched_rr_get_interval(0x0, &(0x7f00000010c0)) [ 409.142791][T12047] device vlan2 entered promiscuous mode [ 409.149347][T12047] device wlan1 entered promiscuous mode 15:52:28 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x380, 0x1, 0x0, &(0x7f00000001c0)='w'}) [ 409.271657][T12047] device wlan1 left promiscuous mode 15:52:29 executing program 1: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x15, 0x0, 0x0, "ea3041a7fa93af6f75e1244f4675d55e"}, 0x15, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 15:52:29 executing program 5: sched_rr_get_interval(0x0, &(0x7f00000010c0)) 15:52:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x801, 0x0) connect$inet(r1, &(0x7f0000000780), 0x10) connect$inet(r1, &(0x7f0000000000), 0x10) 15:52:30 executing program 5: sched_rr_get_interval(0x0, &(0x7f00000010c0)) [ 410.787820][T12082] device vlan2 entered promiscuous mode [ 410.793482][T12082] device wlan1 entered promiscuous mode [ 410.954898][T12082] device wlan1 left promiscuous mode 15:52:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x5609, &(0x7f0000000000)) 15:52:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:30 executing program 4: syz_mount_image$ufs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)) socketpair(0x22, 0x0, 0x8, &(0x7f00000009c0)) 15:52:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000340)) [ 411.723872][T12081] device vlan2 entered promiscuous mode [ 411.729665][T12081] device wlan1 entered promiscuous mode [ 411.862329][T12081] device wlan1 left promiscuous mode 15:52:31 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl(r0, 0x2, &(0x7f0000000000)) 15:52:31 executing program 4: syz_mount_image$ufs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940), 0x0, 0x0) 15:52:32 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x26, 0x0, 0x800) 15:52:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:32 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab01) 15:52:32 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab02) [ 413.330455][T12119] device vlan2 entered promiscuous mode [ 413.338708][T12119] device wlan1 entered promiscuous mode 15:52:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 413.525453][T12119] device wlan1 left promiscuous mode 15:52:33 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x1) 15:52:33 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, 0x0, 0x0) 15:52:33 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1006, 0x0, 0x0) [ 414.191674][T12124] device vlan2 entered promiscuous mode [ 414.197600][T12124] device wlan1 entered promiscuous mode [ 414.291663][T12124] device wlan1 left promiscuous mode 15:52:34 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt(r0, 0x0, 0x9, 0x0, 0x0) 15:52:34 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x1}, 0xc) 15:52:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$hpfs(&(0x7f00000000c0)='hpfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f0000000780)) 15:52:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(0x0, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:35 executing program 4: readv(0xffffffffffffffff, &(0x7f0000002780)=[{0x0}, {&(0x7f00000011c0)=""/86, 0x56}, {0x0}, {0x0}, {0x0, 0xfffffffffffffd42}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) [ 415.703362][T12165] device vlan2 entered promiscuous mode [ 415.709512][T12165] device wlan1 entered promiscuous mode [ 415.888851][T12165] device wlan1 left promiscuous mode 15:52:35 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:52:35 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000640), 0x4) [ 416.472270][T12171] device vlan2 entered promiscuous mode [ 416.478187][T12171] device wlan1 entered promiscuous mode 15:52:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000380)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 416.581424][T12171] device wlan1 left promiscuous mode 15:52:36 executing program 1: syz_emit_ethernet(0x1e8, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb86dd6e8957a601b23201ff"], 0x0) 15:52:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000002780), 0x9) 15:52:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 417.758616][T12202] device vlan2 entered promiscuous mode [ 417.764636][T12202] device wlan1 entered promiscuous mode [ 417.825184][T12202] device wlan1 left promiscuous mode [ 418.312642][T12157] hpfs: Bad magic ... probably not HPFS 15:52:38 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) fchown(r0, 0xffffffffffffffff, 0x0) 15:52:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(0x0, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:38 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000000640), 0x4) 15:52:38 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000640), 0x4) 15:52:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 418.704699][T12219] device vlan2 entered promiscuous mode [ 418.710745][T12219] device wlan1 entered promiscuous mode [ 418.813360][T12219] device wlan1 left promiscuous mode 15:52:38 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x5, 0x0, 0x0) open$dir(&(0x7f0000000480)='./file0\x00', 0x8000, 0x0) 15:52:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000002780)=[{0x0}, {&(0x7f0000000040)=""/86, 0x56}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x5d}, {0x0}, {0x0}], 0x9) [ 419.392317][T12216] device vlan2 entered promiscuous mode [ 419.398079][T12216] device wlan1 entered promiscuous mode 15:52:39 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xffffffff80000000}) [ 419.524588][T12216] device wlan1 left promiscuous mode 15:52:39 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x4, &(0x7f0000000180), 0x0) 15:52:39 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f00000010c0), 0x4) 15:52:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(0x0, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:39 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001280)={&(0x7f00000011c0)=@in={0x2, 0x2}, 0xc, 0x0, 0x0, &(0x7f0000003600)=ANY=[], 0x100}, 0x0) 15:52:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:40 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/221, 0xdd}, 0x0) 15:52:40 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) [ 420.829173][T12261] device vlan2 entered promiscuous mode [ 420.835435][T12261] device wlan1 entered promiscuous mode 15:52:40 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:40 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000640), 0x4) [ 420.943022][T12261] device wlan1 left promiscuous mode 15:52:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) preadv(r0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0) [ 421.615098][T12260] device vlan2 entered promiscuous mode [ 421.623309][T12260] device wlan1 entered promiscuous mode [ 421.701274][T12260] device wlan1 left promiscuous mode 15:52:41 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:41 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000040), 0x0) 15:52:41 executing program 4: syz_emit_ethernet(0x22, &(0x7f00000000c0)={@broadcast, @local, @val, {@ipv4}}, 0x0) 15:52:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:42 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f0000000000), 0x4) 15:52:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 15:52:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:42 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xffffffffffffff57) 15:52:42 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001800)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f0000001580)=[{&(0x7f0000000080)="8d27ab4478ea95d0d1a2bee5515bcf6a93c6e27e66a6b1190559611ecca77ac204762e5dc8bef38258854bab1582ec035e39f1a8929236a9ba86868095ca1d03398e1ba661cc13603a7fb1621334c3dae9712f9e5ae5801854cc32ca38cefd05ee3ff51003929a4ad6de06863323b26eb2c7866640d03dc833d184f6a2c89e51842b601089a5529f856cc29ecadf0d183e14aa1238068905bb7b06b4a6b22227244bd4d0adade54202d9313b6e5abd95bd2531eb1d1c563e681e2968321cc0f9e543", 0xc2}, {&(0x7f0000000180)="b008a7449ded1771f48e19e8332bac02259cc2e461faebfb3431dc4ab22839371791f24cf9a367be9ce024d3238b6f6cf656a67ba0c283d260893043b762b53234c26493c4ead655fce1803378ae8c9fc900758fe2eb68c852c9d7abda4fd3fbde78d9f70dfe9d6a0c319bb94d599f6175820ffc85f217621b406e6578158119c5498fa5f160b36ad9f17447c1ddb8c4028f1924d5989af7f9ec67e53626c48f", 0xa0}, {&(0x7f0000000240)="409bc1294ffee9722b09dcccbbc370a42ade01f9f2194f7ab786055226debbc1efa0e066d26163ee54d7e955443c2de7b71cc659a08781840d88522dcba9447827e7e3ba4bad8cbfae984af9b194db763c88a1c5a41029b7779a08bc67", 0x5d}, {&(0x7f00000002c0)="cf5404a2e24752278190d2894ddc4bfd300ba3b9c8fd630740b152e00fd75b5e573d577d64f678ad3015f819e1b6fd8b69bd6444fd8c403eb4ca3482fc548acb54eb53a7cb73bbfc3cf5869bb56d43e99733e709eeca32c0fa3c2177837551b27324b4d908642a3382a768f31377a137e08eddb1f13db422981a33292e5b3ea108b277577eeeba2771b1c5358f9996b8d969a8d75faf9b7f9cf30656a25ad261bbe2bbeaf6c7637f2ec8b48c6b407209b6a2ba8dd0c9c1ede9", 0xb9}, {&(0x7f0000000380)="8baf46c8297689177bdf1dadb4a92f98e55d88764876207530ef649d7d707d4a21589d6767697fda8d64626bf63c27ac124bc1994559b11c8949b27afea3a84e8c4cdeb254420fd4e8567edb7efe01498ca49dca8a534ba76a8198d753e2a15b2e9f7cd06af2a96e98d615a21beac38ae799dc16d95df2fe2f871d9cf905e6a5c7c7f8ff659bf8d39ebb21fe64e6b5519e5393f2e97d5385c48c6da040bf6c264cbd158786", 0xa5}, {&(0x7f0000000440)="fd7de31bf426e9249d1f3736136d10b00e3a4074e5abe0a00ba569ed3083f59b4ed1628745238aa0208402ba42ca364ab7081ffedfd467f86a51fd2a7cc33ffdd34030cef84a80a61fa3cf6243a64a843cbf9e0f597d9bb0", 0x58}, {&(0x7f00000004c0)="6917b43f259a02657b3b42f9c81a0dbf434e1b8eec32bc4d8226", 0x1a}, {&(0x7f0000000500)="5e2eec2d67a8298a4e2264ac5e5a28424cb171c13dff0376d37acb48a11c01b60516a802350682001b72bbde83db706412fcf00990563b01ee37d036628350282848668d6b6bba1d", 0x48}, {&(0x7f0000000580)="ecaf3c37e6985c8633ed314c4af61a5b222a6d178e332c1104fdbd183dabbb46cc3443ff973aa23d358806609ce3c77299986ca21d27350c6247ee2036cc17b3ee311248b90398bb45922a3e1355618424cc4606f8fbf87d8e736bea75a686e87189dec4c2560931d2aa94c7f3278f1016517aa686f4aa4f56a5957201be73045bf3656f1c66ad3b955d63cc2ec806012a0b19c2041b71554387f77f53e866f321b7c271af270c1afaf7f46631624e24fd956f6c282359afc7f5c6730ddaece4bf33ebffbae1f4e6c6961080893ae9a200a065b1cb9c1f122ca4f8eafa3e37f9f91055a86cf777205ea4ef9353cadd60a539ea80fb1359c5197f1a6db6e10ce584df921b3585b0bfae038ce0eb0d6d6bed5d2c86583e36c3ed9c6d0bdaaf5885515f511a2adaf5c5565daedaa1865d354570dd928be41854927797db49f262a3f0979ab62fc1c50097b692958ab765ee07d1d36e77597f6825383c99d7ea6a03a00e8fd0ee91d80e57ec656919fcc322e1766f848b894f08966da36766ae498d74fd07cc44da879d39d4f81b368d2c14451a608cbcda7b35c21aa8bbcaacac21f550f43d5f2353a768b097a88d8e28dbd8cc97637d5490f94b7eed90b502c5d66a201f0f8cad2613f1922c112b15f9ebc3939ae3690cde1e628ad60e54c96ab89a4b210cd06e6c8155d2ef7c27badd475377ac06135011e13713e4142d552f589ce833b29b08d29c14350d06a0732e8e0b4e0ada796472dd27562d172f0e711aca48856fd209aff801eda0e4de547aa1266d60081f4183f7fb5de0aef514423cb921e042a487d421e5e9b299c980c3980674e8c2de7828526c0270b09e5927529d4308b907d3e0b3565684878ff1458d2d0e261d031aa3dc0c1505a214d5438f57257507be2ec784919dce404b2d21e226e19f24f47ae6e9e528f42ee74d411b4657631a8f5495c1c8ed59bb102b31d0ed3b57ec3958a1e21ad49a0d4e14769965b79059ba868563a4df46e1b84413dc28e4c6a60337fd7db886042dcf9f1a55de2803b74a1748747cc65704d65acb95c3b30d252841c3af084d5242658eadfefe16e95b2d206b0cd92b7915777c792ced0b545bd6f4b89992daa91ae18d57eec2f74ec5bb6e4a387437d6b65118b071bb30f9500cf11cdb9cfad89a22154e74b17c16cdff9761e29beaf03379d375e775a4a1db55fd4deea1ff57697ad566487798901e488e37d655f8e25cbd0cc514afcaca60f73d97cd50c3615e36e87796ec7f2850f8f8e0fa3abaefa629720a880035b701ebd78259fb28781733add11179c097cfe6b97b7da078be7fe54d3c48ec19c5da730fbcbbf9048631a57b2ed1de7d0c457e1167f8cf803db40912365810d4", 0x3d2}], 0x9, &(0x7f0000001780)=[@rights, @cred], 0x58}, 0x0) [ 422.904934][T12295] device vlan2 entered promiscuous mode [ 422.910840][T12295] device wlan1 entered promiscuous mode [ 422.996810][T12295] device wlan1 left promiscuous mode 15:52:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 15:52:42 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)=@un=@abs, 0x8, &(0x7f0000000200), 0x3665ef8d1767ab0d, &(0x7f0000000240)=""/200, 0xc8}, 0x0) 15:52:43 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x80) [ 423.559207][T12299] device vlan2 entered promiscuous mode [ 423.568216][T12299] device wlan1 entered promiscuous mode [ 423.691910][T12299] device wlan1 left promiscuous mode 15:52:43 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, 0x0, 0x0) 15:52:43 executing program 1: open$dir(&(0x7f0000000280)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 15:52:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, 0x0, 0x0) 15:52:44 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:44 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1021, &(0x7f0000000040), 0x0) 15:52:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:44 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) 15:52:44 executing program 1: clock_gettime(0x5, &(0x7f0000001040)) 15:52:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in, 0xc, 0x0}, 0x0) [ 425.087340][T12336] device vlan2 entered promiscuous mode [ 425.093032][T12336] device wlan1 entered promiscuous mode [ 425.226112][T12336] device wlan1 left promiscuous mode 15:52:44 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1005, &(0x7f0000000040), 0x0) 15:52:44 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:45 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt(r0, 0x0, 0x5, 0x0, 0x0) 15:52:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000000), 0x4) 15:52:45 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 15:52:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:45 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:46 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, 0x0, 0x0) [ 426.778583][T12372] device vlan2 entered promiscuous mode [ 426.784593][T12372] device wlan1 entered promiscuous mode [ 427.065243][T12372] device wlan1 left promiscuous mode 15:52:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x9, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) 15:52:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:52:46 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, 0x0, 0x0) 15:52:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:47 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x41, 0x0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) 15:52:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:47 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt(r0, 0x0, 0x7, &(0x7f00000001c0), 0x0) 15:52:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:52:47 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000240), 0x4) 15:52:48 executing program 4: r0 = socket(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000640), 0x0) [ 428.615647][T12398] device vlan2 entered promiscuous mode [ 428.621320][T12398] device wlan1 entered promiscuous mode 15:52:48 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 428.710395][T12398] device wlan1 left promiscuous mode 15:52:48 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2}, 0xc) 15:52:48 executing program 5: pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x0) fcntl$getflags(r0, 0x2) 15:52:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:52:49 executing program 4: syz_emit_ethernet(0x1e8, &(0x7f00000004c0)=ANY=[], 0x0) 15:52:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:49 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) [ 430.018506][ T8807] Bluetooth: hci3: command 0x0406 tx timeout 15:52:49 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f00000013c0)=[{&(0x7f0000000040)=""/98, 0x62}, {&(0x7f00000000c0)=""/255, 0xff}, {0x0}], 0x3) 15:52:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 430.636556][T12430] device vlan2 entered promiscuous mode [ 430.643007][T12430] device wlan1 entered promiscuous mode 15:52:50 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000640), 0x4) [ 430.784873][T12430] device wlan1 left promiscuous mode 15:52:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:50 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 15:52:50 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000640), 0x4) 15:52:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 431.605386][T12443] device vlan2 entered promiscuous mode [ 431.611056][T12443] device wlan1 entered promiscuous mode 15:52:51 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x61, &(0x7f0000000000)=""/226, 0xe2}, 0x0) 15:52:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:51 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000200), 0x4) 15:52:51 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:51 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x3ffffff, 0x4) 15:52:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 432.462374][T12458] device vlan2 entered promiscuous mode [ 432.468213][T12458] device wlan1 entered promiscuous mode 15:52:52 executing program 4: syz_emit_ethernet(0x1e8, 0x0, 0x0) [ 432.638090][T12458] device wlan1 left promiscuous mode 15:52:52 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040), 0x0) 15:52:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:53 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) shutdown(r0, 0x1) 15:52:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:53 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@in, 0xc, 0x0, 0x0, &(0x7f0000000200)=[{0x10}], 0x10}, 0x0) 15:52:53 executing program 5: socket$inet(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000040)={0x2e}, 0x0, 0x0, 0x0) [ 434.205978][T12488] device vlan2 entered promiscuous mode [ 434.211787][T12488] device wlan1 entered promiscuous mode [ 434.402045][T12488] device wlan1 left promiscuous mode 15:52:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:54 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000640), 0x4) 15:52:54 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="fe61a4c4e61234a2afdf2c7cbe86b7a786fda571cf11a18fc65b751e", 0x1c) 15:52:54 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, 0x0, 0x0) 15:52:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:54 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000040), 0x500) 15:52:55 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1006, &(0x7f0000000040), 0x0) 15:52:55 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) [ 435.919095][T12518] device vlan2 entered promiscuous mode [ 435.925046][T12518] device wlan1 entered promiscuous mode 15:52:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 436.027450][T12518] device wlan1 left promiscuous mode 15:52:55 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffc82, 0x0, 0x0, 0x0) 15:52:55 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x1fffd, 0x0) 15:52:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:56 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) readv(r0, &(0x7f0000002300)=[{0x0}], 0x1) [ 436.798196][T12529] device vlan2 entered promiscuous mode [ 436.803892][T12529] device wlan1 entered promiscuous mode 15:52:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:56 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000040), 0x4) 15:52:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 437.714154][T12552] device vlan2 entered promiscuous mode [ 437.719961][T12552] device wlan1 entered promiscuous mode 15:52:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f0000002780)=[{0x0}, {&(0x7f00000011c0)=""/86, 0x56}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) [ 437.876582][T12552] device wlan1 left promiscuous mode 15:52:57 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000040), 0x4) 15:52:58 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) readv(r0, &(0x7f0000002300)=[{&(0x7f0000001100)=""/90, 0x5a}], 0x1) [ 438.482328][T12571] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:52:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:58 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x2}, 0xc) 15:52:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:52:58 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x4, 0x0, 0x0) [ 439.387092][T12583] device vlan2 entered promiscuous mode [ 439.392774][T12583] device wlan1 entered promiscuous mode [ 439.511825][T12583] device wlan1 left promiscuous mode 15:52:59 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f00000013c0)=[{0x0}, {&(0x7f00000000c0)=""/255, 0xff}], 0x2) 15:52:59 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt(r0, 0x0, 0x7, 0x0, 0x0) [ 440.284824][T12593] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:00 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@un=@abs={0x0, 0x0, 0x3}, 0x8, 0x0}, 0x9) 15:53:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:00 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0xffffffffffffff55, 0x0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) 15:53:00 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) [ 441.271437][T12618] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 441.319486][T12620] device vlan2 entered promiscuous mode [ 441.325319][T12620] device wlan1 entered promiscuous mode [ 441.476883][T12620] device wlan1 left promiscuous mode 15:53:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:01 executing program 4: readlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) utimensat(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) 15:53:01 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000040), 0x0) [ 442.248290][T12641] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:02 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000200)="f7", 0x1) 15:53:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:02 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000200), 0x0) 15:53:02 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10, &(0x7f00000010c0), 0x4) 15:53:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 443.181241][T12656] device vlan2 entered promiscuous mode [ 443.187209][T12656] device wlan1 entered promiscuous mode [ 443.344275][T12656] device wlan1 left promiscuous mode 15:53:03 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x2000, &(0x7f0000000040), 0x0) 15:53:03 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) 15:53:03 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0xc12, 0x0) [ 444.223924][T12663] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 444.234216][T12675] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:04 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00') 15:53:04 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 15:53:04 executing program 5: open(&(0x7f0000000100)='./file0\x00', 0x8260, 0x0) execve(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 445.127927][T12692] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 445.197405][T12694] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:05 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:05 executing program 4: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 15:53:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000940)={&(0x7f0000000040)=@file={0x0, './file\x00'}, 0x9, &(0x7f0000000840)=[{&(0x7f0000000680)="8c17cbf9254df76786e357a5d3bd93a79c632e357d3e25eff1491ca92e22c3e8bcb8bbb98192f43bdcedb2f0a2cfbb774ff370eb7dd6b376d6b06d8969d5c6a66a7085ffa13f1b458ab15525af3008f5ff42f4e30b0aea5017c1576d0aa8", 0x5e}, {&(0x7f0000000080)="e69facf5e235df62823ba08f82f191e4c41f8729775faa2bce7ba71f1e962b315bcb3195962160e82e84cf6925e5c69fbd4ff4", 0x33}, {&(0x7f0000000700)="6d81817a220932ba3dd284eae78102b638601671489d23d2f9a4695631717b04e39f916934e257aad620d4e207378ec807d7e2aca2a55e5b23ff468e18d9ef00af9b5d68114cb07e144127e08ac1ff2c7a3ea9438dbaca00ad80449468ead0dab7a936bc82b977fffaf91f85f4650a06d518b5e7586558713fd6d218fc", 0x7d}, {&(0x7f0000000780)="526c7a1479d8f28fe2d5c73b732bd870aa4f820e236e5c0adb84cb498ea32d363b2b0c83b43ebce6fe1946a6d83f4ef1c12735d2b423078961c5ab52b4c09f56b60684f8ab243e5020d4b7c62b707ac00fa0ae5d783f979b5ef7d3a71d7dd2d6909dc6", 0x63}], 0x4, &(0x7f0000000900)=[@cred], 0x20}, 0x9) 15:53:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f00000002c0)=""/162, 0xa2}], 0x3}, 0x0) sendto$unix(r0, &(0x7f0000000400)="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", 0x171, 0x0, 0x0, 0xa) [ 446.038006][T12706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:05 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r1], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040)={0x0, 0xa2cd}, 0x8) 15:53:06 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x88547ad32dd60adc, 0x0) open$dir(&(0x7f00000001c0)='./file2\x00', 0x0, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) 15:53:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000400)="e0", 0x1, 0x0, 0x0, 0xa) sendto(r0, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0xa) 15:53:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, 0x0, 0x0) [ 446.791590][T12721] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f00000002c0)=""/162, 0xa2}], 0x3}, 0x0) sendto$unix(r0, &(0x7f0000000400)="e0a7d7031c97e95f19f949f8023f2c507db7ec0dd0d9f36f7a2775ec01adec969559fbc75af1468dafbb3aa5f7823887ced82e1b5977c3f6a22b2f1a2709f6d117c2997b4912d5cdc33efadd9ece548cbeb4e2bdf04bb1788c721913309407df0188dec663185530a369c258f2b11f2d96c5ad30319a161ac850818189a056cf42ff5bb06d693d25b4174bf6f5f428ab0459ed21e3a78c5267622ca0b017a05f7e31399d18a96202f872456bd8b7d2e14a8ada9f767c", 0xb6, 0x0, 0x0, 0xa) 15:53:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:06 executing program 1: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 15:53:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000680)="8c17cbf9254df76786e357a5d3bd93a79c632e357d3e25eff1491ca92e22c3e8bcb8bbb98192f43bdcedb2f0a2cfbb774ff370eb7dd6b376d6b06d8969d5c6a66a7085ffa13f1b458ab15525af3008f5ff42f4e30b0aea5017c1576d0aa8", 0x5e}, {&(0x7f0000000080)="e69facf5e235df62823ba08f82f191e4c41f8729775faa2bce7ba71f1e962b315bcb3195962160e82e84cf6925e5c69fbd4ff4", 0x33}], 0x2}, 0x0) 15:53:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, 0x0, 0x0) [ 447.595287][T12737] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:07 executing program 4: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 15:53:07 executing program 1: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') 15:53:07 executing program 5: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 15:53:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, 0x0, 0x0) [ 448.424910][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 448.431489][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:53:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/150, 0x96}, 0x2) sendto$unix(r0, &(0x7f0000000400)="e0", 0x1, 0x0, 0x0, 0xa) 15:53:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:08 executing program 5: semctl$GETALL(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)=""/227) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000100)=""/140) 15:53:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:08 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x8260, 0x0) 15:53:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:09 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001080)=[{0x0}], 0x1, 0x0, 0x0) 15:53:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:09 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 15:53:09 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000001740)=[{0x0}], 0x1) 15:53:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 15:53:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:10 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x80087467, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2e51}) [ 450.727409][T12792] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:10 executing program 1: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) 15:53:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)}, 0x0) 15:53:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:11 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x2, 0x0) [ 451.476050][T12807] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:11 executing program 1: r0 = semget(0x1, 0x0, 0x0) semctl$GETZCNT(r0, 0x3, 0x7, &(0x7f00000010c0)=""/51) semget$private(0x0, 0x1, 0x10) semctl$GETALL(0x0, 0x0, 0x6, &(0x7f0000001000)=""/115) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x3000) 15:53:11 executing program 4: socket$unix(0x1, 0x1de59122c200bd64, 0x0) 15:53:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:11 executing program 5: r0 = open$dir(&(0x7f0000001500)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0) 15:53:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 452.326010][T12821] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:12 executing program 1: select(0x40, &(0x7f0000000040)={0x4}, 0x0, &(0x7f0000000100)={0x81}, 0x0) 15:53:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 15:53:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000400)="e0", 0x1, 0x0, 0x0, 0xa) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:53:12 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCNXCL(r0, 0x2000740e) 15:53:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:13 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0xffffffffffffffd7) 15:53:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f0000000200)=""/181, 0xb5}], 0x2}, 0x40) sendto$unix(r0, &(0x7f0000000400)="e0a7d7031c97e95f19f949f8023f2c507db7ec0dd0d9f36f7a2775ec01adec969559fbc75af1468dafbb3aa5f7823887ced82e1b5977c3f6a22b2f1a2709f6d117c2997b4912d5cdc33efadd9ece548cbeb4e2bdf04bb1788c721913309407df0188dec663185530a369c258f2b11f2d96c5ad30319a161ac850818189a056cf42ff5bb06d693d25b4174bf6f5f428ab04", 0x91, 0x0, 0x0, 0xa) [ 453.983794][T12852] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:13 executing program 4: pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 15:53:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 454.396394][T12862] device vlan2 entered promiscuous mode [ 454.402256][T12862] device wlan1 entered promiscuous mode 15:53:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/181, 0xb5}], 0x1}, 0x0) sendto$unix(r0, &(0x7f0000000400)="e0a7d7031c97e95f19f949f8023f2c507db7ec0dd0d9f36f7a2775ec01adec969559fbc75af1468dafbb3aa5f7823887ced82e1b5977c3f6a22b2f1a2709f6d117c2997b4912d5cdc33efadd9ece548cbeb4e2bdf04bb1788c721913309407df0188dec663185530a369c258f2b11f2d96c5ad30319a161ac850818189a056cf42ff5bb06d693d25b4174bf6f5f428ab0459ed21e3a78c5267622ca0b017a05f7e31399d18a96202f872456bd8b7d2e14a8ada9f767c", 0xb6, 0x0, 0x0, 0xa) 15:53:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 454.799227][T12874] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:14 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 15:53:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000003c0), 0x8) 15:53:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00'], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/143, 0x8f}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0xa) [ 455.593454][T12890] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 455.654880][T12892] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001c0001"], 0x28}}, 0x0) 15:53:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x300}, 0x0) 15:53:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x88547ad32dd60adc, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) [ 456.531220][T12906] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 456.720467][T12909] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 15:53:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:16 executing program 1: open(&(0x7f0000000100)='./file0\x00', 0x8260, 0x9d) execve(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) 15:53:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:16 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)=""/147, &(0x7f00000000c0)=0x93) 15:53:16 executing program 5: socketpair(0x1, 0x2, 0x1, &(0x7f0000000200)) [ 457.401903][T12921] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x3}]}, 0x24}}, 0x0) 15:53:18 executing program 1: socket$inet(0x2, 0xa, 0x3ff) 15:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 458.473576][T12939] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 458.570913][T12944] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 15:53:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:18 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 15:53:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 458.921018][T12949] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 458.944817][T12948] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:18 executing program 5: syz_open_dev$I2C(&(0x7f00000001c0)='/dev/i2c-#\x00', 0xffffffff, 0x0) 15:53:18 executing program 1: r0 = syz_usb_connect$cdc_ecm(0x0, 0x92, &(0x7f0000000500)=ANY=[@ANYBLOB="1201000002000008ba0d0010400001020301090280000101000000090400ff0302061400052406000005240000000d240f010000000000000000000c241b07000104070104007f0524150500082407e30000f8ff06240701050008241c04001f3c0d152412feffa317a88b045e4f01a607c0ffcb7e392a090581030004"], 0x0) syz_usb_ep_write(r0, 0x0, 0x2, &(0x7f0000000280)='\x00_') 15:53:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 459.270733][T12953] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 459.295046][T12955] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 459.822563][T12963] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 460.014080][T12966] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 460.044956][ T8453] usb 2-1: new high-speed USB device number 20 using dummy_hcd 15:53:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 460.284663][ T8453] usb 2-1: Using ep0 maxpacket: 8 15:53:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:19 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000140)) 15:53:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000040)=@deltfilter={0x1068, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x6}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x1030, 0x2, [@TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_POLICE={0xc1c, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x10000}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80000000, 0xffff0000, 0x1f, 0x800, 0x7265687d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x3, 0x80, 0x3, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6d4a17ec, 0x7f, 0x0, 0x401, 0xcf, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x9, 0x0, 0x5, 0x0, 0xe8b4, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xd90, 0x6, 0x3, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x7fffffff, 0xffff, 0x10, 0x200, 0x3, 0x477, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9, 0x6, 0x9, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xfffffffb, 0xc00, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x80000000, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffffe1, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c00, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000, 0x2, 0xff5, 0x5]}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_ROUTE4_POLICE={0x408, 0x5, [@TCA_POLICE_PEAKRATE={0x404}]}]}}]}, 0x1068}}, 0x0) [ 460.405399][ T8453] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 460.416097][ T8453] usb 2-1: config 1 interface 0 altsetting 255 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 460.430636][ T8453] usb 2-1: config 1 interface 0 altsetting 255 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 460.444468][ T8453] usb 2-1: config 1 interface 0 has no altsetting 0 15:53:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 460.739211][ T7] Bluetooth: hci4: command 0x0406 tx timeout [ 460.746308][ T8453] usb 2-1: New USB device found, idVendor=0dba, idProduct=1000, bcdDevice= 0.40 [ 460.756228][ T8453] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 460.764534][ T8453] usb 2-1: Product: syz [ 460.768916][ T8453] usb 2-1: Manufacturer: syz [ 460.773920][ T8453] usb 2-1: SerialNumber: syz 15:53:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0x3}]}, 0x24}}, 0x0) [ 461.493768][ T7] usb 2-1: USB disconnect, device number 20 [ 462.265754][ T7] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 462.505202][ T7] usb 2-1: Using ep0 maxpacket: 8 [ 462.625363][ T7] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 462.635885][ T7] usb 2-1: config 1 interface 0 altsetting 255 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 462.647690][ T7] usb 2-1: config 1 interface 0 altsetting 255 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 462.661036][ T7] usb 2-1: config 1 interface 0 has no altsetting 0 15:53:22 executing program 1: socketpair(0x21, 0x0, 0x0, &(0x7f0000000100)) 15:53:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}, 0x1, 0x0, 0x81000000}, 0x0) 15:53:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x209}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 462.887816][ T7] usb 2-1: New USB device found, idVendor=0dba, idProduct=1000, bcdDevice= 0.40 [ 462.898622][ T7] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 462.907169][ T7] usb 2-1: Product: syz [ 462.912587][ T7] usb 2-1: Manufacturer: syz [ 463.025485][T13021] __nla_validate_parse: 7 callbacks suppressed [ 463.025545][T13021] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 463.041586][T13021] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 463.062017][T13020] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 463.124892][ T7] usb 2-1: can't set config #1, error -71 [ 463.133124][ T7] usb 2-1: USB disconnect, device number 21 [ 463.256432][T13027] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:23 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, r0+10000000}}, 0x0) 15:53:23 executing program 4: socketpair(0x1, 0x0, 0x8, &(0x7f0000000040)) 15:53:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x10, 0x1}, 0x1c}}, 0x0) [ 463.961649][T13039] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 464.023608][T13043] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 464.053321][T13044] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 464.063220][T13044] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:23 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, 0x0) 15:53:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0xc0, 0x1}, 0x1c}}, 0x0) 15:53:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB, @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:24 executing program 1: timer_create(0x0, &(0x7f0000000100)={0x0, 0x2, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) [ 464.746112][T13053] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 464.815073][T13056] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001240)={&(0x7f0000000000), 0xc, &(0x7f0000001200)={&(0x7f0000000040)=@deltfilter={0x1054, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x6}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x101c, 0x2, [@TCA_ROUTE4_POLICE={0xc10, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @TCA_POLICE_RATE={0x404}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}]}, @TCA_ROUTE4_POLICE={0x408, 0x5, [@TCA_POLICE_PEAKRATE={0x404}]}]}}]}, 0x1054}}, 0x0) 15:53:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0xd}]}, 0x24}}, 0x0) 15:53:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000c00)=@filter={'filter\x00', 0xe, 0x4, 0x290, 0xffffffff, 0x0, 0x0, 0x1e0, 0xffffffff, 0xffffffff, 0x278, 0x278, 0x278, 0xffffffff, 0x4, 0x0, {[{{@ip={@remote, @loopback, 0x0, 0x0, 'batadv_slave_0\x00', 'bridge_slave_0\x00', {}, {}, 0x0, 0xee6f2e41532ec51b}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@local, @remote, 0x0, 0x0, 'veth1_to_batadv\x00', 'dummy0\x00'}, 0x0, 0x70, 0x94}, @REJECT={0x24, 'REJECT\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x2ec) 15:53:25 executing program 5: r0 = openat$vicodec0(0xffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0245628, &(0x7f0000000080)={0x0, 0x0, 0x3, [], &(0x7f0000000040)}) 15:53:25 executing program 4: openat$cgroup_root(0xffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) 15:53:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x1c, 0x1}, 0x1c}}, 0x0) 15:53:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_deladdrlabel={0x38, 0x49, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) 15:53:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="03"], 0x14}}, 0x0) 15:53:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}, 0x300}, 0x0) 15:53:26 executing program 5: socketpair(0x0, 0xb, 0x0, &(0x7f0000000300)) 15:53:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000040)=@deltfilter={0x105c, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_RATE={0x6}, @TCA_RATE={0x6, 0x5, {0x40, 0x1}}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x101c, 0x2, [@TCA_ROUTE4_POLICE={0xc10, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, 0x615276c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6d40fde6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6b, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6]}, @TCA_POLICE_RATE={0x404, 0x2, [0xffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_ROUTE4_POLICE={0x408, 0x5, [@TCA_POLICE_PEAKRATE={0x404}]}]}}]}, 0x105c}}, 0x0) 15:53:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:27 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0245629, &(0x7f0000000200)={0x0, 0x0, 0x3, [], &(0x7f00000001c0)}) 15:53:27 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0x8}]}, 0x24}}, 0x0) 15:53:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:28 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000100)={0x7fffffff}, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x1000]}, 0x8}) [ 468.632516][T13127] __nla_validate_parse: 19 callbacks suppressed [ 468.632578][T13127] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 468.652781][T13128] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 468.691324][T13129] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 468.701281][T13129] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:28 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5022ef86362adb4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:53:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000040)=@bridge_newneigh={0x30, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_DST_IPV6={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x30}}, 0x0) [ 469.360762][T13136] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 469.529727][T13140] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 469.539641][T13140] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 469.941405][T13145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:30 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:30 executing program 4: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x0, {"6c2792ae0352ec3ab2f8d90e1c64f31e"}}, @ib={0x1b, 0x0, 0x0, {"a9cdc841c654f88e0e0ef484fda3315b"}}}}, 0x118) 15:53:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:30 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x0, 0x0) faccessat(r0, &(0x7f0000000280)='./file0\x00', 0x0) 15:53:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 471.652284][T13162] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 471.802704][T13165] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 471.812508][T13165] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:31 executing program 4: syz_usb_connect(0x0, 0x2d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0xfe, 0xd3, 0x84, 0x8, 0xeb1a, 0x2801, 0x81d3, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xd, 0xd5, 0x3e, 0x0, [], [{{0x9, 0x5, 0x84}}]}}]}}]}}, 0x0) 15:53:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x2c, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6}, @NDA_LINK_NETNSID={0x3}]}, 0x2c}}, 0x0) 15:53:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:32 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 472.894812][ T7] usb 5-1: new high-speed USB device number 3 using dummy_hcd 15:53:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 473.135693][ T7] usb 5-1: Using ep0 maxpacket: 8 [ 473.255818][ T7] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 473.266389][ T7] usb 5-1: New USB device found, idVendor=eb1a, idProduct=2801, bcdDevice=81.d3 [ 473.275929][ T7] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 473.498010][ T7] usb 5-1: config 0 descriptor?? [ 473.555443][ T7] em28xx 5-1:0.0: New device @ 480 Mbps (eb1a:2801, interface 0, class 0) [ 473.564920][ T7] em28xx 5-1:0.0: DVB interface 0 found: bulk [ 473.666136][T13197] __nla_validate_parse: 8 callbacks suppressed [ 473.666349][T13197] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 473.776486][ T7] em28xx 5-1:0.0: unknown em28xx chip ID (0) 15:53:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 473.890286][ T7] em28xx 5-1:0.0: failed to trigger read from i2c address 0xa0 (error=-5) [ 473.899313][ T7] em28xx 5-1:0.0: board has no eeprom [ 474.004698][ T7] em28xx 5-1:0.0: Identified as eMPIA Technology, Inc. GrabBeeX+ Video Encoder (card=21) [ 474.026668][ T7] em28xx 5-1:0.0: dvb set to bulk mode. [ 474.038938][ T5] em28xx 5-1:0.0: Remote control support is not available for this card. [ 474.127311][ T1990] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 474.218447][ T7] usb 5-1: USB disconnect, device number 3 [ 474.278393][ T7] em28xx 5-1:0.0: Disconnecting em28xx [ 474.284186][ T7] em28xx 5-1:0.0: Closing input extension [ 474.311673][T13212] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 474.350060][ T7] em28xx 5-1:0.0: Freeing device [ 474.496846][ T1990] usb 2-1: config 0 has no interfaces? [ 474.502481][ T1990] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 474.511979][ T1990] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 474.588953][ T1990] usb 2-1: config 0 descriptor?? [ 474.770484][ T7] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 474.833368][ T1990] usb 2-1: USB disconnect, device number 22 [ 475.024941][ T7] usb 5-1: Using ep0 maxpacket: 8 [ 475.146630][ T7] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 475.156916][ T7] usb 5-1: New USB device found, idVendor=eb1a, idProduct=2801, bcdDevice=81.d3 [ 475.166485][ T7] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 475.188683][ T7] usb 5-1: config 0 descriptor?? [ 475.231857][ T7] em28xx 5-1:0.0: New device @ 480 Mbps (eb1a:2801, interface 0, class 0) [ 475.241241][ T7] em28xx 5-1:0.0: DVB interface 0 found: bulk 15:53:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001f3075"], 0x14}}, 0x0) 15:53:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 475.454908][ T7] em28xx 5-1:0.0: unknown em28xx chip ID (0) [ 475.594985][ T7] em28xx 5-1:0.0: failed to trigger read from i2c address 0xa0 (error=-5) [ 475.604021][ T7] em28xx 5-1:0.0: board has no eeprom [ 475.625858][ T8455] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 475.758919][T13242] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 475.769061][T13241] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 475.815102][ T7] em28xx 5-1:0.0: Identified as eMPIA Technology, Inc. GrabBeeX+ Video Encoder (card=21) [ 475.825812][ T7] em28xx 5-1:0.0: dvb set to bulk mode. [ 475.832798][ T1990] em28xx 5-1:0.0: Remote control support is not available for this card. [ 475.933943][ T7] usb 5-1: USB disconnect, device number 4 [ 475.941746][ T7] em28xx 5-1:0.0: Disconnecting em28xx [ 475.947684][ T7] em28xx 5-1:0.0: Closing input extension [ 475.998090][ T8455] usb 2-1: config 0 has no interfaces? [ 476.003746][ T8455] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 476.013248][ T8455] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 476.063599][ T7] em28xx 5-1:0.0: Freeing device [ 476.111087][ T8455] usb 2-1: config 0 descriptor?? 15:53:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:35 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 476.378028][ T55] usb 2-1: USB disconnect, device number 23 15:53:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:36 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x42488}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 476.795574][T13266] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 476.823333][T13267] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 476.905212][T13268] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:36 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:36 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/mnt\x00') 15:53:37 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 477.522241][T13284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 477.594016][T13285] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 477.639304][T13286] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 477.724656][ T55] usb 2-1: new high-speed USB device number 24 using dummy_hcd 15:53:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6}]}, 0x24}}, 0x0) [ 478.112497][ T55] usb 2-1: config 0 has no interfaces? [ 478.118528][ T55] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 478.128036][ T55] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 478.275803][ T55] usb 2-1: config 0 descriptor?? [ 478.525529][ T55] usb 2-1: USB disconnect, device number 24 15:53:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:38 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:38 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 479.312520][T13316] __nla_validate_parse: 3 callbacks suppressed [ 479.312673][T13316] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 479.348106][T13318] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c}, 0x1c}, 0x300}, 0x0) 15:53:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:39 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 480.063876][T13332] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 480.092531][T13333] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 480.284792][ T1990] usb 2-1: new high-speed USB device number 25 using dummy_hcd 15:53:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 480.665492][ T1990] usb 2-1: config 0 has no interfaces? [ 480.671678][ T1990] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 480.681989][ T1990] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 480.701474][ T1990] usb 2-1: config 0 descriptor?? [ 480.737682][T13343] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 480.960407][ T18] usb 2-1: USB disconnect, device number 25 15:53:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:41 executing program 4: r0 = syz_open_dev$I2C(&(0x7f00000001c0)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0}) 15:53:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:41 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@loopback, @in6=@initdev}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 481.800238][T13362] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 481.853658][T13365] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}, 0x1, 0x0, 0x2}, 0x0) 15:53:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 482.625865][ T8455] usb 2-1: new high-speed USB device number 26 using dummy_hcd 15:53:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:53:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 482.731604][T13379] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 482.744095][T13379] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 482.995623][ T8455] usb 2-1: config 0 has no interfaces? [ 483.002429][ T8455] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 483.013220][ T8455] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 483.103950][ T8455] usb 2-1: config 0 descriptor?? [ 483.358434][ T7] usb 2-1: USB disconnect, device number 26 15:53:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 484.156633][T13398] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:44 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-ssse3\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}}], 0x500, 0x0, 0x0) 15:53:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c000280", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 484.974828][T13410] __nla_validate_parse: 1 callbacks suppressed [ 484.974970][T13410] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 484.993590][T13410] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={&(0x7f0000001240), 0xc, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x2c, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6}, @NDA_LINK_NETNSID={0x8}]}, 0x2c}}, 0x0) [ 485.787378][T13429] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 486.062243][T13432] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 486.072730][T13432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:45 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0xee) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 486.335116][ T55] Bluetooth: hci5: command 0x0406 tx timeout 15:53:46 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1}, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x1000]}, 0x8}) [ 486.583166][T13440] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) [ 486.902691][T13445] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 486.915746][T13445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c00", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:46 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) [ 487.307512][T13454] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 487.709559][T13458] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:47 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) 15:53:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:49 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:49 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) 15:53:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:49 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) [ 490.079410][ T8807] usb 2-1: new high-speed USB device number 27 using dummy_hcd 15:53:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 490.446077][ T8807] usb 2-1: config 0 has no interfaces? [ 490.451944][ T8807] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 490.463119][ T8807] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 490.492433][T13499] __nla_validate_parse: 9 callbacks suppressed [ 490.492501][T13499] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 490.509700][T13498] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 490.583799][ T8807] usb 2-1: config 0 descriptor?? [ 490.586237][T13501] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 490.598618][T13501] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:50 executing program 4: ioctl$I2C_TIMEOUT(0xffffffffffffffff, 0x702, 0x7fffffff) [ 490.861383][ T8807] usb 2-1: USB disconnect, device number 27 [ 491.051399][T13510] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. 15:53:52 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:52 executing program 4: ioctl$I2C_TIMEOUT(0xffffffffffffffff, 0x702, 0x7fffffff) 15:53:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) [ 493.399202][T13525] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 493.434170][T13527] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 493.453259][T13528] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:53 executing program 4: ioctl$I2C_TIMEOUT(0xffffffffffffffff, 0x702, 0x7fffffff) [ 493.714940][ T7] usb 2-1: new high-speed USB device number 28 using dummy_hcd 15:53:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 494.076228][ T7] usb 2-1: config 0 has no interfaces? [ 494.082045][ T7] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 494.091933][ T7] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 494.252639][ T7] usb 2-1: config 0 descriptor?? [ 494.391964][T13539] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 494.472243][T13543] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 494.511284][ T8455] usb 2-1: USB disconnect, device number 28 15:53:54 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:54 executing program 4: r0 = syz_open_dev$I2C(0x0, 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) 15:53:54 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:53:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:55 executing program 4: r0 = syz_open_dev$I2C(0x0, 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) 15:53:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 495.873567][T13567] __nla_validate_parse: 4 callbacks suppressed [ 495.873781][T13567] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 495.975141][ T18] usb 2-1: new high-speed USB device number 29 using dummy_hcd [ 496.132409][T13571] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 496.184111][T13572] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 496.375507][ T18] usb 2-1: config 0 has no interfaces? [ 496.381174][ T18] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 496.390756][ T18] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 15:53:56 executing program 4: r0 = syz_open_dev$I2C(0x0, 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x7fffffff) 15:53:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 496.511466][ T18] usb 2-1: config 0 descriptor?? [ 496.720734][T13578] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 496.762041][ T18] usb 2-1: USB disconnect, device number 29 [ 496.850792][T13585] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. [ 496.917367][T13587] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:53:58 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:53:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:53:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:58 executing program 4: syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(0xffffffffffffffff, 0x702, 0x7fffffff) 15:53:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b00000004000380080005", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:58 executing program 1: syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x83c0550b, &(0x7f0000000180)) [ 498.590122][T13600] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 498.651193][T13601] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:58 executing program 4: syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(0xffffffffffffffff, 0x702, 0x7fffffff) 15:53:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:53:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 499.035455][ T18] usb 2-1: new high-speed USB device number 30 using dummy_hcd 15:53:58 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 499.358987][T13615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 499.424886][ T18] usb 2-1: config 0 has no interfaces? [ 499.430819][ T18] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 499.440285][ T18] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 499.481105][T13619] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 15:53:59 executing program 4: syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(0xffffffffffffffff, 0x702, 0x7fffffff) [ 499.653990][ T18] usb 2-1: config 0 descriptor?? 15:53:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:53:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:53:59 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 499.909537][ T7] usb 2-1: USB disconnect, device number 30 15:53:59 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x0) 15:54:00 executing program 1: syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x83c0550b, &(0x7f0000000180)) 15:54:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:00 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$inet(0x2, 0x200000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, 0x0, &(0x7f0000000040)) [ 501.100002][T13648] __nla_validate_parse: 2 callbacks suppressed [ 501.100067][T13648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:00 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x0) [ 501.316510][T13653] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.2'. 15:54:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:01 executing program 3: r0 = syz_open_dev$I2C(&(0x7f00000001c0)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f00000002c0)={0x0, 0x0, 0x7, &(0x7f0000000280)={0x0, "441cdae4999c56d2fd64360379aa370d3f46603d8bbd4bb211430d0ceec3a7eae0"}}) 15:54:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:54:01 executing program 4: r0 = syz_open_dev$I2C(&(0x7f0000000000)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_TIMEOUT(r0, 0x702, 0x0) [ 501.827256][ T7] usb 2-1: new high-speed USB device number 31 using dummy_hcd 15:54:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 502.195497][ T7] usb 2-1: config 0 has no interfaces? [ 502.201218][ T7] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 502.212996][ T7] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 15:54:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}, 0x1, 0x0, 0xc}, 0x0) [ 502.384104][ T7] usb 2-1: config 0 descriptor?? [ 502.636084][ T8455] usb 2-1: USB disconnect, device number 31 15:54:02 executing program 1: syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x83c0550b, &(0x7f0000000180)) 15:54:02 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$inet(0x2, 0x200000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:02 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000180)={0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {r0}}, &(0x7f0000000200)) 15:54:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:54:02 executing program 3: openat$cgroup_root(0xffffff9c, &(0x7f0000002c40)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 15:54:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:54:03 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, 0x0, 0xffffff1f}, 0x0) 15:54:03 executing program 4: r0 = openat$vicodec0(0xffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000040)) [ 504.185236][ T1990] usb 2-1: new high-speed USB device number 32 using dummy_hcd 15:54:04 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() socket$inet(0x2, 0x200000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:04 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_aout(r2, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x1020) [ 504.545344][ T1990] usb 2-1: config 0 has no interfaces? [ 504.551006][ T1990] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 504.560664][ T1990] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 504.680730][ T1990] usb 2-1: config 0 descriptor?? [ 504.930948][ T1990] usb 2-1: USB disconnect, device number 32 15:54:05 executing program 3: msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000000)=""/93) r0 = syz_open_dev$vcsu(&(0x7f0000000300)='/dev/vcsu#\x00', 0x0, 0x208000) r1 = msgget(0x0, 0x0) msgsnd(r1, &(0x7f0000000100)={0x3}, 0x8, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/73) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)) 15:54:05 executing program 4: r0 = openat$rdma_cm(0xffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0), 0x13f}}, 0x20) 15:54:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:05 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:05 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:05 executing program 3: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, 0x0}, 0x3a8) read$FUSE(0xffffffffffffffff, 0x0, 0xee) statx(0xffffffffffffffff, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0) 15:54:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:05 executing program 4: r0 = openat$vicodec0(0xffffff9c, &(0x7f0000000480)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0245628, &(0x7f0000000500)={0x0, 0x0, 0x0, [], 0x0}) [ 506.516185][ T1990] usb 2-1: new high-speed USB device number 33 using dummy_hcd 15:54:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 506.876805][ T1990] usb 2-1: config 0 has no interfaces? [ 506.882540][ T1990] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 506.892161][ T1990] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 507.014656][ T1990] usb 2-1: config 0 descriptor?? [ 507.261414][ T1990] usb 2-1: USB disconnect, device number 33 [ 507.313056][T13768] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:07 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:07 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, 0x0) 15:54:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={&(0x7f0000001240), 0xc, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x2c, 0x1c, 0x1, 0x0, 0x0, {0x7}, [@NDA_PORT={0x6}, @NDA_PROBES={0x8}]}, 0x2c}}, 0x0) 15:54:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 507.992558][T13783] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001700)=@ipmr_delroute={0x2c, 0x19, 0x501, 0x0, 0x0, {}, [@RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @SEG6_LOCAL_SRH={0xc}}]}, 0x2c}}, 0x0) 15:54:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2242eafd4eb764f9dc3f45f9f65515b0e1838d8665522be18bd10a48b043ccc44a7c2837cf75603e732646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e17094cbd77fd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e803bd6f2b2a3e3173d5661cfeec"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r3}, 0x10) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) 15:54:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c000000100001040000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:07 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0xffffffffffffff3f}}, 0x0) [ 508.724755][T13204] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 508.783076][T13805] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 509.085187][T13204] usb 2-1: config 0 has no interfaces? [ 509.090907][T13204] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 509.100727][T13204] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 509.186447][T13204] usb 2-1: config 0 descriptor?? [ 509.433717][ T8807] usb 2-1: USB disconnect, device number 34 [ 509.864339][ T3130] ieee802154 phy0 wpan0: encryption failed: -22 [ 509.871161][ T3130] ieee802154 phy1 wpan1: encryption failed: -22 15:54:09 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:09 executing program 4: pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0)={[0x1000]}, 0x8}) 15:54:09 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=ANY=[@ANYBLOB="240000001c000100"/20, @ANYRES32=0x0, @ANYBLOB="0000000006"], 0x24}}, 0x0) [ 510.190297][T13830] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x2c, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6}, @NDA_LINK_NETNSID={0x8}]}, 0x2c}}, 0x0) 15:54:10 executing program 4: r0 = syz_open_dev$I2C(&(0x7f00000001c0)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f00000002c0)={0x0, 0x1, 0x7, &(0x7f0000000280)={0x0, "441cdae4999c56d2fd64360379aa370d3f46603d8bbd4bb211430d0ceec3a7eae0"}}) 15:54:10 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:10 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 510.962597][T13846] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:10 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@map, 0xffffffffffffffff, 0x24}, 0x10) [ 511.065629][ T1990] usb 2-1: new high-speed USB device number 35 using dummy_hcd [ 511.427177][ T1990] usb 2-1: config 0 has no interfaces? [ 511.432835][ T1990] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 511.442339][ T1990] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 511.506536][ T1990] usb 2-1: config 0 descriptor?? [ 511.750267][ T1990] usb 2-1: USB disconnect, device number 35 15:54:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:11 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x2c, 0x1c, 0x1, 0x0, 0x0, {0x7}, [@NDA_PORT={0x6}, @NDA_PROBES={0x8}]}, 0x2c}}, 0x0) 15:54:11 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:11 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, 0x0) [ 512.469583][T13874] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:12 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:12 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000480)={'batadv0\x00'}) 15:54:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:12 executing program 4: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000100)={0x7fffffff}, 0x0, 0x0, 0x0) 15:54:12 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 513.306004][T13891] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 513.345197][ T18] usb 2-1: new high-speed USB device number 36 using dummy_hcd 15:54:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1b, 0x1c, 0x1}, 0x1c}}, 0x0) [ 513.755492][ T18] usb 2-1: config 0 has no interfaces? [ 513.761336][ T18] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 513.770914][ T18] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 513.842664][ T18] usb 2-1: config 0 descriptor?? [ 514.099302][ T18] usb 2-1: USB disconnect, device number 36 15:54:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:14 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:14 executing program 4: getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 15:54:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:14 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x1c, 0x1, 0x0, 0x0, {0x2}}, 0x1c}}, 0x0) [ 514.831079][T13918] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be5636602", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:14 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 15:54:14 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, 0x0) 15:54:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 515.534753][T13929] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 515.778398][T13938] ptrace attach of "/root/syz-executor.5"[13937] was attempted by "/root/syz-executor.5"[13938] [ 515.797515][ T1990] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 516.165713][ T1990] usb 2-1: config 0 has no interfaces? [ 516.171568][ T1990] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 516.190257][ T1990] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 516.257675][ T1990] usb 2-1: config 0 descriptor?? [ 516.519789][ T1990] usb 2-1: USB disconnect, device number 37 15:54:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000246b9f4013206104ec4c000000010902"], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:16 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:16 executing program 3: socket(0x2b, 0x1, 0x2) 15:54:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x107000) 15:54:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:54:16 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0xffffffffffffffff) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 517.315940][T13962] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:17 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000001c0)) 15:54:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 15:54:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:17 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x200000f0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:54:17 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 518.145584][ T7] usb 2-1: new high-speed USB device number 38 using dummy_hcd [ 518.207847][T13981] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 518.505516][ T7] usb 2-1: config 0 has no interfaces? [ 518.511238][ T7] usb 2-1: New USB device found, idVendor=2013, idProduct=0461, bcdDevice=4c.ec [ 518.521271][ T7] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 518.582917][T13985] ptrace attach of "/root/syz-executor.5"[13984] was attempted by "/root/syz-executor.5"[13985] [ 518.628708][ T7] usb 2-1: config 0 descriptor?? [ 518.870786][ T8455] usb 2-1: USB disconnect, device number 38 15:54:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 15:54:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{&(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="a8"], 0xa8}}], 0x2, 0x0) 15:54:19 executing program 4: r0 = openat$urandom(0xffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 15:54:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be563660200", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 15:54:19 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 519.969256][T14008] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 520.065983][T14010] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 15:54:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) getpid() r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$autofs(0xffffff9c, 0x0, 0x480, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000800, 0x10000020000000fb], 0x100000, 0x200400}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3a92, 0x0, 0x7, 0x5, 0x0, 0x3, 0x0, 0x81ba, 0xea5b, 0x4, 0x80000000, 0x6], 0x4000}) 15:54:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) 15:54:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:54:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x816d000) 15:54:20 executing program 5: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}}, 0x0) 15:54:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast2}}]}, 0x50}}, 0x0) 15:54:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) [ 521.839400][T14037] ptrace attach of "/root/syz-executor.5"[14035] was attempted by "/root/syz-executor.5"[14037] 15:54:21 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:21 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0245629, 0x0) 15:54:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}}, 0x0) 15:54:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x4ffe2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@private1, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000000c0)=0xe4) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}}, 0x0) 15:54:22 executing program 3: syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 15:54:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}}, 0x0) 15:54:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x73, 0x1}, 0x1c}}, 0x0) 15:54:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x0, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:22 executing program 3: syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000080), 0x0) 15:54:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x1, 0x0, 0x0, {}, [@NDA_LINK_NETNSID={0x8, 0xd}]}, 0x24}}, 0x0) 15:54:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000040)=@deltfilter={0x105c, 0x2d, 0x0, 0x0, 0x0, {}, [@TCA_CHAIN={0x8, 0xb, 0x4}, @TCA_RATE={0x6, 0x5, {0x7, 0x1}}, @filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x101c, 0x2, [@TCA_ROUTE4_POLICE={0xc10, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xb9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff]}, @TCA_POLICE_PEAKRATE={0x404}]}, @TCA_ROUTE4_POLICE={0x408, 0x5, [@TCA_POLICE_PEAKRATE={0x404}]}]}}]}, 0x105c}}, 0x4800) 15:54:24 executing program 5: getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:24 executing program 0: syz_open_dev$I2C(&(0x7f00000001c0)='/dev/i2c-#\x00', 0x1, 0x42281) 15:54:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_deladdrlabel={0x38, 0x49, 0x1, 0x0, 0x0, {0xa, 0x0, 0x10}, [@IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_LABEL={0x8}]}, 0x38}}, 0x0) 15:54:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/212) 15:54:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x0, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:25 executing program 3: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x38) 15:54:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x24, 0x1c, 0x0, 0x0, 0x0, {}, [@NDA_PORT={0x6, 0xe}]}, 0x24}}, 0x0) 15:54:25 executing program 0: r0 = openat$rtc(0xffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 15:54:25 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) [ 525.879528][T14101] ptrace attach of "/root/syz-executor.5"[14099] was attempted by "/root/syz-executor.5"[14101] 15:54:25 executing program 5: getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 526.095019][ T7] usb 2-1: new high-speed USB device number 39 using dummy_hcd [ 526.284850][ T7] usb 2-1: device descriptor read/64, error 18 15:54:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x1c, 0x1}, 0x1c}}, 0x0) 15:54:26 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f686581037210100b72d010203010902120001000000000904"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 15:54:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x1c, 0x1, 0x0, 0x0, {0xf}}, 0x1c}}, 0x0) [ 526.490668][T14115] ptrace attach of "/root/syz-executor.5"[14114] was attempted by "/root/syz-executor.5"[14115] 15:54:26 executing program 5: getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000700000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e61740000000000000000000000000000000000000000000000000000000010001e0000000000aaaaaaaaaabb0000fdffffff00000000"]}, 0x380) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 526.554872][ T7] usb 2-1: new high-speed USB device number 40 using dummy_hcd 15:54:26 executing program 4: r0 = syz_open_dev$I2C(&(0x7f00000001c0)='/dev/i2c-#\x00', 0x0, 0x0) ioctl$I2C_SMBUS(r0, 0x720, 0x0) [ 526.756500][ T7] usb 2-1: device descriptor read/64, error 18 [ 526.874981][ T7] usb usb2-port1: attempt power cycle 15:54:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x1c, 0x1}, 0x1c}}, 0x0) [ 527.043382][T14127] ptrace attach of "/root/syz-executor.5"[14126] was attempted by "/root/syz-executor.5"[14127] [ 527.344872][ T1990] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 527.584984][ T1990] usb 4-1: Using ep0 maxpacket: 16 [ 527.590442][ T7] usb 2-1: new high-speed USB device number 41 using dummy_hcd [ 527.766428][ T7] usb 2-1: device descriptor read/8, error -61 [ 527.864862][ T1990] usb 4-1: New USB device found, idVendor=2137, idProduct=0001, bcdDevice=2d.b7 [ 527.875045][ T1990] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 527.883198][ T1990] usb 4-1: Product: syz [ 527.888457][ T1990] usb 4-1: Manufacturer: syz [ 527.893182][ T1990] usb 4-1: SerialNumber: syz [ 527.939694][ T1990] usb 4-1: config 0 descriptor?? [ 527.995221][ T1990] as10x_usb: device has been detected [ 528.001562][ T1990] dvbdev: DVB: registering new adapter (Sky IT Digital Key (green led)) [ 528.045349][ T7] usb 2-1: new high-speed USB device number 42 using dummy_hcd [ 528.110556][ T1990] usb 4-1: DVB: registering adapter 1 frontend 0 (Sky IT Digital Key (green led))... [ 528.211952][ T1990] ===================================================== [ 528.214431][ T1990] BUG: KMSAN: uninit-value in schedule_debug+0xcc/0x1f0 [ 528.223674][ T1990] CPU: 0 PID: 1990 Comm: kworker/0:2 Not tainted 5.11.0-rc7-syzkaller #0 [ 528.223674][ T1990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.223674][ T1990] Workqueue: usb_hub_wq hub_event [ 528.223674][ T1990] Call Trace: [ 528.223674][ T1990] dump_stack+0x21c/0x280 [ 528.223674][ T1990] kmsan_report+0xfb/0x1e0 [ 528.223674][ T1990] __msan_warning+0x5f/0xa0 [ 528.223674][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.223674][ T1990] schedule_debug+0xcc/0x1f0 [ 528.223674][ T1990] __schedule+0x67/0x5c0 [ 528.223674][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.223674][ T1990] schedule+0x270/0x330 [ 528.223674][ T1990] io_schedule+0xcc/0x160 [ 528.223674][ T1990] wait_on_page_bit_common+0x11ab/0x18f0 [ 528.223674][ T1990] ? trace_raw_output_file_check_and_advance_wb_err+0x3f0/0x3f0 [ 528.223674][ T1990] generic_file_buffered_read_pagenotuptodate+0x4f5/0x1bb0 [ 528.223674][ T1990] generic_file_buffered_read_get_pages+0xf42/0x2120 [ 528.223674][ T1990] generic_file_buffered_read+0x851/0x2160 [ 528.223674][ T1990] ? kmsan_get_shadow_origin_ptr+0x29/0xb0 [ 528.333024][ T1990] ? ret_from_fork+0x1f/0x30 [ 528.333024][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.333024][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.333024][ T1990] generic_file_read_iter+0x1bb/0xcf0 [ 528.333024][ T1990] ? kmsan_get_shadow_origin_ptr+0x29/0xb0 [ 528.333024][ T1990] ? stack_trace_save+0x117/0x1a0 [ 528.363491][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.363491][ T1990] ext4_file_read_iter+0x8e2/0xd00 [ 528.363491][ T1990] ? ext4_llseek+0x4b0/0x4b0 [ 528.363491][ T1990] __kernel_read+0xc2a/0x13e0 [ 528.363491][ T1990] integrity_kernel_read+0xfc/0x140 [ 528.363491][ T1990] ima_calc_file_hash+0x1ba5/0x40e0 [ 528.363491][ T1990] ? kmsan_internal_set_origin+0x85/0xc0 [ 528.363491][ T1990] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 528.363491][ T1990] ? up_read+0x40/0x2b0 [ 528.363491][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.363491][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.363491][ T1990] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 528.430496][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.430496][ T1990] ? kmsan_internal_set_origin+0x85/0xc0 [ 528.430496][ T1990] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 528.442635][ T1990] ima_collect_measurement+0x585/0xba0 [ 528.442635][ T1990] process_measurement+0x24f3/0x3770 [ 528.442635][ T1990] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 528.442635][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.442635][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.442635][ T1990] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 528.442635][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.442635][ T1990] ima_file_check+0x131/0x170 [ 528.442635][ T1990] path_openat+0x5812/0x6a30 [ 528.442635][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.442635][ T1990] do_file_open_root+0x4c1/0xc30 [ 528.442635][ T1990] ? kmsan_internal_set_origin+0x85/0xc0 [ 528.442635][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.442635][ T1990] file_open_root+0x920/0x990 [ 528.442635][ T1990] kernel_read_file_from_path_initns+0x257/0x430 [ 528.442635][ T1990] fw_get_filesystem_firmware+0x68e/0xf40 [ 528.442635][ T1990] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 528.442635][ T1990] _request_firmware+0x15f9/0x2170 [ 528.442635][ T1990] request_firmware+0xc8/0x110 [ 528.442635][ T1990] as102_fw_upload+0x2a5/0x830 [ 528.442635][ T1990] as102_dvb_register+0xcc3/0xe00 [ 528.442635][ T1990] as102_usb_probe+0xad8/0xd60 [ 528.442635][ T1990] ? as10x_cmd_stop_streaming+0x360/0x360 [ 528.442635][ T1990] usb_probe_interface+0xfcc/0x1520 [ 528.442635][ T1990] ? usb_register_driver+0x900/0x900 [ 528.442635][ T1990] really_probe+0xe15/0x24d0 [ 528.442635][ T1990] driver_probe_device+0x29d/0x3a0 [ 528.442635][ T1990] __device_attach_driver+0x63f/0x830 [ 528.442635][ T1990] bus_for_each_drv+0x2c8/0x3f0 [ 528.442635][ T1990] ? deferred_probe_work_func+0x400/0x400 [ 528.442635][ T1990] __device_attach+0x56a/0x890 [ 528.442635][ T1990] device_initial_probe+0x4a/0x60 [ 528.442635][ T1990] bus_probe_device+0x17e/0x3d0 [ 528.442635][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.442635][ T1990] device_add+0x2c15/0x31d0 [ 528.442635][ T1990] usb_set_configuration+0x3872/0x3eb0 [ 528.442635][ T1990] ? usb_set_configuration+0xa61/0x3eb0 [ 528.442635][ T1990] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 528.442635][ T1990] usb_generic_driver_probe+0x138/0x300 [ 528.442635][ T1990] ? usb_choose_configuration+0xee0/0xee0 [ 528.442635][ T1990] usb_probe_device+0x317/0x570 [ 528.442635][ T1990] ? usb_register_device_driver+0x590/0x590 [ 528.442635][ T1990] really_probe+0xe15/0x24d0 [ 528.442635][ T1990] driver_probe_device+0x29d/0x3a0 [ 528.442635][ T1990] __device_attach_driver+0x63f/0x830 [ 528.442635][ T1990] bus_for_each_drv+0x2c8/0x3f0 [ 528.442635][ T1990] ? deferred_probe_work_func+0x400/0x400 [ 528.442635][ T1990] __device_attach+0x56a/0x890 [ 528.442635][ T1990] device_initial_probe+0x4a/0x60 [ 528.442635][ T1990] bus_probe_device+0x17e/0x3d0 [ 528.442635][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.442635][ T1990] device_add+0x2c15/0x31d0 [ 528.442635][ T1990] usb_new_device+0x1bd4/0x2a30 [ 528.442635][ T1990] hub_event+0x5b99/0x8870 [ 528.442635][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.442635][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.442635][ T1990] ? led_work+0x780/0x780 [ 528.442635][ T1990] process_one_work+0x1219/0x1fe0 [ 528.442635][ T1990] worker_thread+0x10ec/0x2340 [ 528.442635][ T1990] kthread+0x521/0x560 [ 528.442635][ T1990] ? process_one_work+0x1fe0/0x1fe0 [ 528.442635][ T1990] ? kthread_blkcg+0x110/0x110 [ 528.442635][ T1990] ret_from_fork+0x1f/0x30 [ 528.442635][ T1990] [ 528.442635][ T1990] Local variable ----wait@mempool_alloc created at: [ 528.442635][ T1990] mempool_alloc+0x66/0x990 [ 528.442635][ T1990] mempool_alloc+0x66/0x990 [ 528.442635][ T1990] ===================================================== [ 528.442635][ T1990] Disabling lock debugging due to kernel taint [ 528.837564][ T1990] Kernel panic - not syncing: corrupted stack end detected inside scheduler [ 528.844446][ T1990] CPU: 0 PID: 1990 Comm: kworker/0:2 Tainted: G B 5.11.0-rc7-syzkaller #0 [ 528.844446][ T1990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.844446][ T1990] Workqueue: usb_hub_wq hub_event [ 528.844446][ T1990] Call Trace: [ 528.844446][ T1990] dump_stack+0x21c/0x280 [ 528.844446][ T1990] panic+0x4c6/0xea7 [ 528.844446][ T1990] ? asm_sysvec_apic_timer_interrupt+0x10/0x20 [ 528.844446][ T1990] ? add_taint+0x17c/0x210 [ 528.844446][ T1990] ? add_taint+0x17c/0x210 [ 528.844446][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.844446][ T1990] schedule_debug+0xf5/0x1f0 [ 528.844446][ T1990] __schedule+0x67/0x5c0 [ 528.844446][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.844446][ T1990] schedule+0x270/0x330 [ 528.844446][ T1990] io_schedule+0xcc/0x160 [ 528.844446][ T1990] wait_on_page_bit_common+0x11ab/0x18f0 [ 528.844446][ T1990] ? trace_raw_output_file_check_and_advance_wb_err+0x3f0/0x3f0 [ 528.844446][ T1990] generic_file_buffered_read_pagenotuptodate+0x4f5/0x1bb0 [ 528.844446][ T1990] generic_file_buffered_read_get_pages+0xf42/0x2120 [ 528.844446][ T1990] generic_file_buffered_read+0x851/0x2160 [ 528.844446][ T1990] ? kmsan_get_shadow_origin_ptr+0x29/0xb0 [ 528.844446][ T1990] ? ret_from_fork+0x1f/0x30 [ 528.844446][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.844446][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.844446][ T1990] generic_file_read_iter+0x1bb/0xcf0 [ 528.844446][ T1990] ? kmsan_get_shadow_origin_ptr+0x29/0xb0 [ 528.997436][ T1990] ? stack_trace_save+0x117/0x1a0 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] ext4_file_read_iter+0x8e2/0xd00 [ 528.997436][ T1990] ? ext4_llseek+0x4b0/0x4b0 [ 528.997436][ T1990] __kernel_read+0xc2a/0x13e0 [ 528.997436][ T1990] integrity_kernel_read+0xfc/0x140 [ 528.997436][ T1990] ima_calc_file_hash+0x1ba5/0x40e0 [ 528.997436][ T1990] ? kmsan_internal_set_origin+0x85/0xc0 [ 528.997436][ T1990] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 528.997436][ T1990] ? up_read+0x40/0x2b0 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.997436][ T1990] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] ? kmsan_internal_set_origin+0x85/0xc0 [ 528.997436][ T1990] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 528.997436][ T1990] ima_collect_measurement+0x585/0xba0 [ 528.997436][ T1990] process_measurement+0x24f3/0x3770 [ 528.997436][ T1990] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 528.997436][ T1990] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] ima_file_check+0x131/0x170 [ 528.997436][ T1990] path_openat+0x5812/0x6a30 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] do_file_open_root+0x4c1/0xc30 [ 528.997436][ T1990] ? kmsan_internal_set_origin+0x85/0xc0 [ 528.997436][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 528.997436][ T1990] file_open_root+0x920/0x990 [ 528.997436][ T1990] kernel_read_file_from_path_initns+0x257/0x430 [ 528.997436][ T1990] fw_get_filesystem_firmware+0x68e/0xf40 [ 528.997436][ T1990] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 528.997436][ T1990] _request_firmware+0x15f9/0x2170 [ 528.997436][ T1990] request_firmware+0xc8/0x110 [ 528.997436][ T1990] as102_fw_upload+0x2a5/0x830 [ 528.997436][ T1990] as102_dvb_register+0xcc3/0xe00 [ 528.997436][ T1990] as102_usb_probe+0xad8/0xd60 [ 528.997436][ T1990] ? as10x_cmd_stop_streaming+0x360/0x360 [ 528.997436][ T1990] usb_probe_interface+0xfcc/0x1520 [ 528.997436][ T1990] ? usb_register_driver+0x900/0x900 [ 528.997436][ T1990] really_probe+0xe15/0x24d0 [ 528.997436][ T1990] driver_probe_device+0x29d/0x3a0 15:54:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0x83c0550b, &(0x7f0000000180)) 15:54:28 executing program 0: syz_open_dev$video4linux(&(0x7f0000000540)='/dev/v4l-subdev#\x00', 0x3, 0x0) 15:54:28 executing program 5: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x2, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x380) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:54:28 executing program 4: r0 = openat$vsock(0xffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 15:54:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001480)=@bridge_newneigh={0x1c, 0x1c, 0x1}, 0x1c}}, 0x0) [ 528.997436][ T1990] __device_attach_driver+0x63f/0x830 [ 528.997436][ T1990] bus_for_each_drv+0x2c8/0x3f0 [ 528.997436][ T1990] ? deferred_probe_work_func+0x400/0x400 [ 528.997436][ T1990] __device_attach+0x56a/0x890 [ 529.256586][ T1990] device_initial_probe+0x4a/0x60 [ 529.256586][ T1990] bus_probe_device+0x17e/0x3d0 [ 529.256586][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 529.256586][ T1990] device_add+0x2c15/0x31d0 [ 529.256586][ T1990] usb_set_configuration+0x3872/0x3eb0 [ 529.256586][ T1990] ? usb_set_configuration+0xa61/0x3eb0 [ 529.256586][ T1990] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 529.256586][ T1990] usb_generic_driver_probe+0x138/0x300 [ 529.256586][ T1990] ? usb_choose_configuration+0xee0/0xee0 [ 529.256586][ T1990] usb_probe_device+0x317/0x570 [ 529.256586][ T1990] ? usb_register_device_driver+0x590/0x590 [ 529.256586][ T1990] really_probe+0xe15/0x24d0 [ 529.256586][ T1990] driver_probe_device+0x29d/0x3a0 [ 529.256586][ T1990] __device_attach_driver+0x63f/0x830 [ 529.256586][ T1990] bus_for_each_drv+0x2c8/0x3f0 [ 529.256586][ T1990] ? deferred_probe_work_func+0x400/0x400 [ 529.256586][ T1990] __device_attach+0x56a/0x890 [ 529.256586][ T1990] device_initial_probe+0x4a/0x60 [ 529.256586][ T1990] bus_probe_device+0x17e/0x3d0 [ 529.256586][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 529.256586][ T1990] device_add+0x2c15/0x31d0 [ 529.256586][ T1990] usb_new_device+0x1bd4/0x2a30 [ 529.256586][ T1990] hub_event+0x5b99/0x8870 [ 529.256586][ T1990] ? kmsan_get_metadata+0x116/0x180 [ 529.256586][ T1990] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 529.256586][ T1990] ? led_work+0x780/0x780 [ 529.256586][ T1990] process_one_work+0x1219/0x1fe0 [ 529.256586][ T1990] worker_thread+0x10ec/0x2340 [ 529.256586][ T1990] kthread+0x521/0x560 [ 529.256586][ T1990] ? process_one_work+0x1fe0/0x1fe0 [ 529.256586][ T1990] ? kthread_blkcg+0x110/0x110 [ 529.256586][ T1990] ret_from_fork+0x1f/0x30 [ 529.256586][ T1990] Kernel Offset: disabled [ 529.256586][ T1990] Rebooting in 86400 seconds..